Data Leakage Worldwide: Part 3 -- The Insider Threat


SAN JOSE, CA--(Marketwire - November 20, 2008) -



Part 3: Highlights/Key Facts: November 20, 2008

  • Cisco releases third and final set of research findings on data leakage, this time focusing on the "insider threat" within companies and how malicious or inadvertent behavior impacts data protection for companies, employees, customers, and partners.
  • The research features perceptions and behavior of 2,000 employees and IT professionals in 10 countries: the United States, United Kingdom, France, Germany, Italy, Japan, China, India, Australia, and Brazil.
  • Key Findings: The Insider Threat
    • The majority of IT professionals feel that employees pose more of a security threat than outsiders.
    • One in three IT respondents said portable hard drive devices are the top concern for how data is leaked -- more than email, lost or stolen devices, and verbal communication.
    • Some employees admit they kept corporate-issued devices after leaving previous jobs, and their reasons vary from relying on it for personal use to getting back at their companies.
    • About one in 10 employees lost or had a corporate device stolen in the year leading up to the study, creating a data loss incident for themselves and their companies.
    • One in 10 employees admit that they or someone they knew stole corporate information and/or devices and/or sold them for profit.
  • http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: The Effectiveness of Corporate Security Policies | November 3, 2008

Part 1: Common Employee Data Leakage Risks and Mistakes | October 21, 2008

Tags / Keywords:

Security, Cisco security, network security, data loss, data leakage, data loss prevention, data protection, IT security, employee behavior, IT perceptions, security policy, IT policy, corporate policy, policy, insider, insider threat

Links / URLs:


Quotes:

  • John N. Stewart, Chief Security Officer, Cisco

  • "Businesses are enabling employees to become increasingly collaborative and mobile. Without modern-day security technologies, policies, awareness and education, information is more vulnerable. Today, data is in transit, in use, within programs, stored on devices, and in places beyond the traditional business environment, such as at home, on the road, in cafes, on airplanes and trains. This trend is here to stay. To protect your data effectively, we need to start understanding the risk characteristics of business and then base technology, policy, and awareness and education plans on those factors."

Embedded Videos, Images and Podcasts:
Internet TV Broadcast on Study Results:

Part 3: http://tools.cisco.com/cmn/jsp/index.jsp?id=81059
Part 2: http://tools.cisco.com/cmn/jsp/index.jsp?id=80358
Part 1: http://tools.cisco.com/cmn/jsp/index.jsp?id=79228

John N. Stewart: Cisco CSO's Security Strategy
http://www.youtube.com/v/-tYBZV-O7A0&hl=en&fs=1

Christopher Burgess: Data Leakage & the Threat Landscape
http://www.youtube.com/v/sehTddBFNEs&hl=en&fs=1

Nasrin Rezai: Cisco's Approach to Preventing Data Leakage
http://www.youtube.com/v/CwM46MGbof0&hl=en&fs=1

Traditional Press Release:
Part 3: http://newsroom.cisco.com/dlls/2008/prod_111208.html;
Part 2: http://newsroom.cisco.com/dlls/2008/prod_102808.html;
Part 1: http://newsroom.cisco.com/dlls/2008/prod_093008.html

Social Media Release: Part 1 & 2: http://newsroom.cisco.com/dlls/2008/prod_102108.html

RSS Feed for Cisco: http://newsroom.cisco.com/dlls/rss.html

Contact Information: Contact Information: Press Contact(s) Neil Wu Becker Cisco Systems, Inc. +1 408 525 7415 nebecker@cisco.com Industry Analyst Relations Todd Hanson Cisco Systems, Inc. +1 408 853 8255 todhanso@cisco.com