Are you Preventing Data Losses?

September 2009
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p16
Trade Publication
The article reports on the study conducted by Ponemon Institute LLC regarding data protection in 2009. The study found out that there are 58% of companies which believe that data protection is crucial as part of their risk management, while 12% of companies are in doubt. The study also claimed that 76% of the respondents have experienced two or more data hacks in 2008.


Related Articles

  • Average Cost of Cyber Crime Per Company is US$7.7M.  // CFO Innovation Asia;10/15/2015, p1 

    The article reports on the 13 percent and 14 percent increase in average annualized cost of cyber crime incurred by a benchmark sample of Australian and Japanese organizations according to a Ponemon Institute study that was sponsored by HP Enterprise Security. Topics discussed include ways...

  • Building Risk Resilience. DURBIN, STEVE // Information Security;Jun2012, Vol. 14 Issue 5, p7 

    The author discusses security measures to deal with computer security threats and the challenges faced by business enterprises. He mentions various computer network threats including external threats, regulatory threats and internal threats. Several security measures are suggested including that...

  • SPYWARE, UNCHECKED. Hines, Matt // eWeek;11/13/2006, Vol. 23 Issue 45, p30 

    The article presents results of a study conducted by Ponemon Institute LLC on problems related to spyware. More than 500 North American IT security professionals were interviewed for the study. Majority of respondents said despite having technology and procedures in place to prevent and...

  • Act on foreign spy risk, firms urged. Goodwin, Bill // Computer Weekly;12/5/2006, p14 

    The article presents information on the warning from Great Britain's National Infrastructure Security Co-ordination Center (NISCC) to business in Great Britain concerning information security threats from foreign intelligence agencies. The NISCC has warned business in Great Britain to protect...

  • McAfee - adding risk-based protection.  // MarketWatch: Global Round-up;Oct2006, Vol. 5 Issue 10, p180 

    The article presents information on the risk management software solutions from McAfee Inc. These software includes McAfee Foundstone Enterprise 5.0, a priority-based vulnerability management solution and McAfee Preventsys Compliance Auditor and Risk Analyzer, which allow organizations to...

  • ...look to a next-generation firewell? Messmer, Ellen // Network World;1/10/2011, Vol. 28 Issue 1, p24 

    The article discusses the transition of the business from a traditional port-based firewalls into a new generation of firewalls (NGFW). It stresses a different way of establishing business security that is associated with firewall such as application-aware controls over employees' access to the...

  • Security Convergence - The Future can be found in the Past. Elliott, David // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68 

    The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will...

  • More WiFi worries ahead.  // Accountancy;Jul2008, Vol. 142 Issue 1379, p69 

    This article discusses the development of devices that can find a wireless Internet router at a distance of 300 yards. Security consultant David Hobson from Global Security Systems Inc. comments on the simplicity of constructing an extended range wireless antenna. The creation of a guest server...

  • Hackers Target Midsize Businesses, Survey Shows.  // Bank Security Report;Nov2010, Vol. 39 Issue 11, p8 

    The article discusses the result of the study conducted by security firm McAfee Inc. entitled "The Security Paradox" which found out that midsize companies are suspending their information technology security budgets at a time when they are seeing an increase in cyber attacks. More than half the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics