Global State of Information Security© Survey 2014
Posted by Theodore on Κυριακή, Σεπτεμβρίου 07, 2014 with No comments
Recently, PwC has published the latest Global State of Information Security© Survey 2014. Major key findings include:
Gary Loveland, a principal in PwC’s security practice, argues: “You can't fight today's threats with yesterday’s strategies”. His arguments sum up in“What’s needed is a new model of information security, one that is driven by knowledge of threats, assets, and the motives and targets of potential adversaries.”
You can find the original report here. Here are some charts presenting the findings of the survey.
- Despite an increase in security practices, the adversaries continue to have the initiative
- The number of detected security incidents has raised, followed by the cost of breaches
- Emerging technologies, such as BYOD and cloud computing, pose a significant risk and are implemented before being secured
Gary Loveland, a principal in PwC’s security practice, argues: “You can't fight today's threats with yesterday’s strategies”. His arguments sum up in“What’s needed is a new model of information security, one that is driven by knowledge of threats, assets, and the motives and targets of potential adversaries.”
You can find the original report here. Here are some charts presenting the findings of the survey.
The global cyber-defence race (values %)
The fundamental safeguards you’ll need for an effective security program.
- A written security policy
- Backup-Recovery plans / BCP
- Minimum collection and retention of personal information, with physical access restrictions to records containing personal data
- Strong technology safeguards for prevention, detection, encryption
- Accurate inventory of where personal data of the employees and customers are collected, transmitted and stored, including third parties that handle that data
- Internal and external risk assessments of privacy, security, confidentiality and integrity, of electronics and paper records
- Ongoing monitoring of the data-privacy program
- Personnel background checks
- An employee security awareness training program
- Require employees and third parties to comply with privacy policies
The fusion of cloud computing, mobility, personal devices, and social media is a challenge for all countries. (values %)
Legal notice:
All copyrighted material is property of their respected owners. If you feel that your intellectual property is violated, please contact us to resolve the issue.
Categories: Survey
0 comments:
Δημοσίευση σχολίου