SAN JOSE, CA--(Marketwire - November 20, 2008) -
Part 3: Highlights/Key Facts: November 20, 2008
- Cisco releases third and final set of research findings on data
leakage, this time focusing on the "insider threat" within companies
and how malicious or inadvertent behavior impacts data protection for
companies, employees, customers, and partners.
- The research features perceptions and behavior of 2,000 employees
and IT professionals in 10 countries: the United States, United
Kingdom, France, Germany, Italy, Japan, China, India, Australia, and
Brazil.
- Key Findings: The Insider Threat
- The majority of IT professionals feel that employees pose more of a
security threat than outsiders.
- One in three IT respondents said portable hard drive devices are the
top concern for how data is leaked -- more than email, lost or stolen
devices, and verbal communication.
- Some employees admit they kept corporate-issued devices after leaving
previous jobs, and their reasons vary from relying on it for personal use
to getting back at their companies.
- About one in 10 employees lost or had a corporate device stolen in the
year leading up to the study, creating a data loss incident for themselves
and their companies.
- One in 10 employees admit that they or someone they knew stole
corporate information and/or devices and/or sold them for profit.
- http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: The Effectiveness of Corporate Security Policies | November 3,
2008
Part 1: Common Employee Data Leakage Risks and Mistakes | October 21,
2008
Tags / Keywords:
Security, Cisco security, network security, data loss, data leakage, data
loss prevention, data protection, IT security, employee behavior, IT
perceptions, security policy, IT policy, corporate policy, policy, insider,
insider threat
Links / URLs:
Quotes:
- John N. Stewart, Chief Security Officer, Cisco
"Businesses
are enabling employees to become increasingly collaborative and mobile.
Without modern-day security technologies, policies, awareness and
education, information is more vulnerable. Today, data is in transit, in
use, within programs, stored on devices, and in places beyond the
traditional business environment, such as at home, on the road, in cafes,
on airplanes and trains. This trend is here to stay. To protect your data
effectively, we need to start understanding the risk characteristics of
business and then base technology, policy, and awareness and education
plans on those factors."
Embedded Videos, Images and Podcasts:
Internet TV Broadcast on Study Results:
Part 3: http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: http://tools.cisco.com/cmn/jsp/index.jsp?id=80358
Part 1: http://tools.cisco.com/cmn/jsp/index.jsp?id=79228
John N. Stewart: Cisco CSO's Security Strategy
http://www.youtube.com/v/-tYBZV-O7A0&hl=en&fs=1
Christopher Burgess: Data Leakage & the Threat Landscape
http://www.youtube.com/v/sehTddBFNEs&hl=en&fs=1
Nasrin Rezai: Cisco's Approach to Preventing Data Leakage
http://www.youtube.com/v/CwM46MGbof0&hl=en&fs=1
Traditional Press Release:
Part 3: http://newsroom.cisco.com/dlls/2008/prod_111208.html;
Part 2: http://newsroom.cisco.com/dlls/2008/prod_102808.html;
Part 1: http://newsroom.cisco.com/dlls/2008/prod_093008.html
Social Media Release: Part 1 & 2:
http://newsroom.cisco.com/dlls/2008/prod_102108.html
RSS Feed for Cisco: http://newsroom.cisco.com/dlls/rss.html
Contact Information: Contact Information:
Press Contact(s)
Neil Wu Becker
Cisco Systems, Inc.
+1 408 525 7415
nebecker@cisco.com
Industry Analyst Relations
Todd Hanson
Cisco Systems, Inc.
+1 408 853 8255
todhanso@cisco.com