Do Your End Users Care About Security? I Doubt It.
Security has become the greatest inhibitor to cloud adoption, and still looms as an unaddressed issue.
Organizations have invested significant sums to protect their perimeters, but are not deploying mechanisms that can stop a security incident from occurring internally. Year after year, statistics prove that end users are responsible, either accidently or deliberately, for the majority of data breaches – 68 percent of breaches, in fact.
You can protect at the document level, but identifying a security violation that is contained within the content of the document, when it is created, ingested, or even attached to an email, provides a more granular and safer approach, as all privacy and confidential content will be proactively identified and protected.
Attachments, faxes, scans, and emails may all contain security or confidential information that must also be protected. It takes only one person to cause a data breach.
The Concept Searching metadata framework and conceptTaxonomyWorkflow provide the tools to proactively stop data breaches before they happen, identifying existing vulnerabilities. Although most security software solutions provide standard descriptors, Concept Searching’s also provide the ability to associate text with descriptors.
Using Concept Searching tools, organizations are not limited to standard descriptors, such as credit card number, PII, PHI, and social security numbers, but can define any content that is confidential to them, such as financial information, engineering drawings, or new product information.
This flexibility allows rules to be designed, to remove items from search, send to a secure repository, send to an application, prevent portability, or send to the person responsible. Additional rules can be defined to further process the content in question.
Why the Problem?
88% of security breaches are attributed to negligence (Wharton Information Security Best Practices)
80% of employees use unsecure file sharing methods, putting corporate data at risk (Workshare)
Hidden data in documents accounts for the highest number of exposures
How Much is it Costing?
The average cost of a data breach is $4 million, and 70% of data breaches are caused by internal employees (Ponemon Institute and IBM)
The average cost of a record involved in a data breach is $158 (Ponemon Institute)
Brand loss averages $3.3 million plus the cost of the breach (Ponemon Institute)
Intelligent Content in Context
Elimination of manual tagging ensures content is shared by authorized staff
Eliminates help desk issues, inbound communications, investigations, remediation, legal costs, product discounts, to mitigate breach, and brand damage – average cost is $1.07 million (IBM)
The inability to identify meaningful word strings from within content can open a Pandora’s box of problems in conjunction with cyber security. What do you think?
Join us for our ‘Eliminate the 17.4% Documents that Contain Data Breaches’ webinar on Wednesday, September 13th. Issues relating to security breaches from within content now occur with alarming frequency. This session shows how to focus on the identification of unknown security exposures that exist as content is ingested or created, to avoid costly and damaging ramifications.