The long-awaited Verizon 2014 Data Breach Investigations Report is out and it’s well worth reading.
While the report’s portrayal of our (in)secure IT world is dismal, the finding that 92% of security incidents from the past decade can be categorized into one of nine "threat patterns" makes it surprisingly relevant.
Out of the nine threat patterns, the three I found most interesting were user errors, insider and privilege misuse, physical theft or lost devices. Each of these three areas is distinctly less sexy – but more realistic – for most companies than an army of evil hackers from Nation X.
Within these threat patterns, the report mentioned four simple takeaways worth remembering. I pulled the below texts as direct quotes with the page number,

    1. Know your data – “The first step in protecting your data is in knowing where it is, and who has access to it. From this, build controls to protect it and detect misuse.” (page 26)
    1. Encrypt it before you lose it - “Considering the high frequency of lost assets, encryption is as close to a no-brainer solution as it gets for this incident pattern.” (page 28)
    1. Get systematic with your data – “Highly repetitive and mundane business processes involving sensitive info are particularly error prone.” (page 29)
    1. Start making steps - “organizations can take steps to decrease the frequency of all manner of accidents by reducing their exposure to the common error patterns that result in data disclosure.” (page 31)


So there you have it. On each of these four points, Safetica offers viable help, with its DLP, encryption, and activity monitoring capabilities.  I recommend reading the full report online or, at a minimum, reading the SecurityWeek summary.

Author
Safetica team

Next articles

Signing drivers through Windows HLK

Let’s go together over the steps that are required in order to sign a driver using Microsoft HLK.

Differences between SaaS DLP and legacy on-prem Data Loss Prevention solutions

It can be too complex and heavyweight for small and midsized companies handle legacy DLP solutions. Luckily there’s an alternative – cloud-native SaaS DLP.

The Great Resignation as a Threat to Data Security

The Great Resignation is trend in which large numbers of employees have voluntarily been resigning from their jobs. Read how to prepare for the Great Resignation and not lose any data.