How can attacks be avoided?
✓ Ensure essential controls are met
✓ Find, track, and assess data
✓ Monitor event logs
What do attacks have in
common?
75% were not discovered
83% were not highly difficult
87% were avoidable
How do breaches occur?
62% system error
59% hacking and intrusions
31% incorporated malicious code
22% exploited a vulnerability
15% physical threats
Who is behind data breaches?
73% resulted from external sources
18% were caused by insiders
39% implicated business partners
Backup and Config |
|
![]() |
|