Date/Time Stamp:
November 20, 2008, 5:00 a.m. PDT
Part 3: Highlights/Key Facts: November 20, 2008
- Cisco releases third and final set of research findings on data leakage, this time focusing on the "insider threat" within companies and how malicious or inadvertent behavior impacts data protection for companies, employees, customers, and partners.
- The research features perceptions and behavior of 2,000 employees and IT professionals in 10 countries: the United States, United Kingdom, France, Germany, Italy, Japan, China, India, Australia, and Brazil.
- Key Findings: The Insider Threat
- The majority of IT professionals feel that employees pose more of a security threat than outsiders.
- One in three IT respondents said portable hard drive devices are the top concern for how data is leaked - more than email, lost or stolen devices, and verbal communication.
- Some employees admit they kept corporate-issued devices after leaving previous jobs, and their reasons vary from relying on it for personal use to getting back at their companies.
- About one in 10 employees lost or had a corporate device stolen in the year leading up to the study, creating a data loss incident for themselves and their companies.
- One in 10 employees admit that they or someone they knew stole corporate information and/or devices and/or sold them for profit.
- http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: The Effectiveness of Corporate Security Policies | November 3, 2008
Part 1: Common Employee Data Leakage Risks and Mistakes | October 21, 2008
Tags / Keywords:
Security, Cisco security, network security, data loss, data leakage, data loss prevention, data protection, IT security, employee behavior, IT perceptions, security policy, IT policy, corporate policy, policy, insider, insider threat
Links / URLs:
- Research results: www.cisco.com/go/dlp
- White paper Part 1: http://cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.html
- White paper Part 2: http://cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.html
- White paper Part 3: http://cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-506224.html
- Cisco Platform blog: Do You Know Where Your Data Is? http://blogs.cisco.com/news/comments/do_you_know_where_your_data_really_is/#more
- Cisco Platform blog: Picture Window http://blogs.cisco.com/news/comments/picture_window1/#more
- DigItAll Consumer: Data Leakage Concerns for Consumers: http://blogs.cisco.com/consumer/comments/data_leakage_concerns_for_consumers
- DigItAll Consumer: How to Avoid Vulnerabilities Online: http://blogs.cisco.com/consumer/comments/how_to_avoid_vulnerabilities_online
- DigItAll Consumer: Threats to Consumers on the Internet: http://blogs.cisco.com/consumer/comments/threats_to_consumers_on_the_internet
- YouTube Channel: http://www.youtube.com/Cisco
Quotes:
- John N. Stewart, Chief Security Officer, Cisco
"Businesses are enabling employees to become increasingly collaborative and mobile. Without modern-day security technologies, policies, awareness and education, information is more vulnerable. Today, data is in transit, in use, within programs, stored on devices, and in places beyond the traditional business environment, such as at home, on the road, in cafes, on airplanes and trains. This trend is here to stay. To protect your data effectively, we need to start understanding the risk characteristics of business and then base technology, policy, and awareness and education plans on those factors."
Embedded Videos, Images and Podcasts:
- Internet TV Broadcast on Study Results:
- John N. Stewart: Cisco CSO's Security Strategy
- Christopher Burgess: Data Leakage & the Threat Landscape
- Nasrin Rezai: Cisco's Approach to Preventing Data Leakage
Part 3: http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: http://tools.cisco.com/cmn/jsp/index.jsp?id=80358
Part 1: http://tools.cisco.com/cmn/jsp/index.jsp?id=79228
Traditional Press Release:
Part 3: http://newsroom.cisco.com/dlls/2008/prod_111208.html;
Part 2: http://newsroom.cisco.com/dlls/2008/prod_102808.html;
Part 1: http://newsroom.cisco.com/dlls/2008/prod_093008.html
Social Media Release: Part 1 & 2: http://newsroom.cisco.com/dlls/2008/prod_102108.html