infoblox infographic - 2017 top data security risks€¦ · personal information intellectual...

1
RANSOMWARE RISKS RISKS RISKS RISKS INSIDER THREATS DENIAL OF SERVICE Attackers want control over your network, not just access to sensitive data. KNOW YOUR DATA AUTOMATE YOUR PROCESSES UNDERSTAND YOUR CONTEXT Front-line professionals consider ransomware as the top threat to data availability, followed by insider threats and Denial of Service attacks. The SANS survey reveals common business practices increase data risk. Manual processes are inefficient, error prone, and expensive in the face of today’s massively automated cyber attacks. www.infoblox.com/solutions/data-protection-and-malware-mitigation/ Understand what your sensitive data consists of, where it lives, and your network topology. Use automation to establish and reinforce policies, procedures, and incident response. Use endpoint and network controls that provide information about data locations, user behavior, devices, and threats in context so you can take effective action faster. use manual processes to locate their sensitive data. rely on databases and servers for data storage. either don’t protect DNS pathways or don’t know if they do. use between 2 and 10 separate solutions to protect sensitive data. Increased virtualization and cloud storage can complicate policy compliance and other organizational needs. DNS is the leading attack vector for malware, the majority of which is ransomware. 1 Poor visibility and lack of integration can create security gaps and delay response times when breaches occur. of respondents experienced two or more threats in past 12 months 78 % 68 % attacks are pervasive what attackers want most actions to take to protect your data Learn more about protecting your users and data top threats User login IDs and passwords Privilege credentials Customer identifiable personal information Intellectual property Human resources & employee data Financial data on customers Corporate financial data 42 % 32 % 31 % 27 % 26 % 21 % 17 % MANUAL PROCESSES SOLUTION SILOS ENDANGERED DNS CLOUDY STORAGE 1 2 3 factors that compromise data 60 % 88 % SECURE YOUR ACCESS Apply network security best practices to safeguard account access information. WATCH YOUR DNS Monitor DNS-based threats in real time with tools designed for the task. 58 % 78 % 5 The SANS 2017 Data Protection Survey (September 2017) explores sensitive data types and how organizations are protecting their sensitive data in today’s progressively connected and mobile world. 257 IT and security personnel from small, medium and large organizations,most of which are headquartered and operating in the U.S. ABOUT THE SURVEY WHO PARTICIPATED hit by same threat multiple times top data security risks and what you can do about them Results from the SANS 2017 Data Protection Survey 20 7 KEY TAKEAWAY Organizations need a better understanding of their sensitive data and how technology can help reinforce policy and procedures to protect that data.

Upload: others

Post on 21-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Infoblox Infographic - 2017 Top Data Security Risks€¦ · personal information Intellectual property Human resources & employee data Financial data on customers Corporate 42% financial

RANSOMWARE

RISKS RISKS RISKS RISKS

INSIDER THREATS

DENIAL OF SERVICE

Attackers want control over your network, not just access to sensitive data.

KNOW YOUR DATA AUTOMATE YOURPROCESSES

UNDERSTAND YOURCONTEXT

Front-line professionals consider ransomware as the top threat to data availability, followed by insider threats and Denial of Service attacks.

The SANS survey reveals common business practices increase data risk.

Manual processes are inecient,error prone, and expensive in the face of today’s massively automated cyber attacks.

www.infoblox.com/solutions/data-protection-and-malware-mitigation/

Understand what your sensitive dataconsists of, where it lives, and yournetwork topology. Use automation to establish and reinforce

policies, procedures, and incident response.

Use endpoint and network controls that provide information about data locations, user behavior, devices, and threats in context so you can take eective action faster.

use manual processes to locatetheir sensitive data.

rely on databasesand servers for data storage.

either don’t protectDNS pathways or don’tknow if they do.

use between 2 and 10 separate solutions to protect sensitive data.

Increased virtualization andcloud storage can complicatepolicy compliance and otherorganizational needs.

DNS is the leading attack vector for malware, the majority of which is ransomware.1

Poor visibility and lack ofintegration can create securitygaps and delay response timeswhen breaches occur.

of respondentsexperienced twoor more threats inpast 12 months

78% 68%

attacks are pervasive what attackers want most

actions to take to protect your data

Learn more about protecting your users and data

top threats

User login IDsand passwords

Privilegecredentials

Customer identifiablepersonal information Intellectual property

Human resources& employee data

Financial dataon customers

Corporatefinancial data

Human resources

42%

32%

31% 27%

26%

21%

17%

MANUAL PROCESSES SOLUTION SILOSENDANGERED DNSCLOUDY STORAGE

1

2

3

Sources: Cisco 2016 Annual Security Report and Malwarebytes research1

factors that compromise data

60% 88%

SECURE YOUR ACCESSApply network security best practices tosafeguard account access information.

WATCH YOUR DNSMonitor DNS-based threats in realtime with tools designed for the task.

58% 78%

5

The SANS 2017 Data Protection Survey (September 2017) explores sensitive data types and how organizations are protecting their sensitive data in today’s progressively connected and mobile world.

257 IT and security personnel from small, medium and large organizations,most of which are headquartered and operating in the U.S.

ABOUT THE SURVEY

WHO PARTICIPATED

hit by same threatmultiple times

top data security risks and what you can do about them

Results from the SANS 2017 Data Protection Survey

20 7KEY

TAKEAWAYOrganizations need a better understanding of their sensitive data and how technology can help reinforce policy and procedures to protect that data.