CIO
2.6K views | +2 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Pál Kerékfy
Scoop.it!

Lopjunk szellemi tulajdont?

There is a critical disconnect between the cyber security behaviour that top executives recommend and the way they behave themselves, while many firms do not know where their data lives and moves, a report reveals.

More than seven in 10 CEOs admit they have taken valuable intellectual property (IP) from a former employer.

78% of CEOs polled agree that ideas, in the form of IP, are still the most precious asset in the enterprise.

93% of CEOs say they keep a copy of their work on a personal device, outside the relative safety of company servers.

63% of CEOs polled admitted to clicking on a link they should not have or did not intend to.

The majority of business leaders (77%) believe their IT department would view this behavior as a security risk, but they do it anyway.

The findings also underline the need for a realistic data security strategy that not only addresses human behavior, but also takes both prevention and recovery into account.

73% of security and IT leaders saying they believe that some company data exists only on endpoints and 70% admitting that losing all corporate data held on endpoint devices would be business-destroying or seriously disruptive.

Pál Kerékfy's insight:

Vizet prédikál és bort iszik a legtöbb üzleti vezető, amikor a rá bízott értékes információról van szó. Szereti a saját kezében tudni, és szereti magával vinni, amikor vált – bár tudja, hogy így a cég legértékesebb vagyonát viszi magával.

De amíg a helyén marad, addig is lazán figyelmen kívül hagyja az éppen általa jóváhagyott szabályokat, és kockáztatja a cége sorsát.

A biztonsági és informatikai vezetők is látják a problémákat és a kockázatot…

A felmérést végző cég (Code24) szerint nem elég a jónak látszó szabályzat, az emberi viselkedést is figyelembe kell venni!

A felmérés (amiben 1000 informatikai és biztonsági vezető és 600 üzleti vezető vett részt)  itt szerezhető meg: https://on.code42.com/go/content-data-exposure-report-g/

#CEO #CIO #CISO #CSO #hypocrisy #UK #USA #Germany #Code24 #policy

more...
No comment yet.
Scooped by Pál Kerékfy
Scoop.it!

Five Mobile App Security Techniques Hackers Don’t Want You to Use – Itango.eu

Five Mobile App Security Techniques Hackers Don’t Want You to Use – Itango.eu | CIO | Scoop.it

Why are things different on mobile devices? First, these devices, and any sensitive data they contain, are more likely to be lost or stolen. Second, new attacks are emerging that exploit mobile devices. Malware can be installed on adjacent devices to extract sensitive information. Electronic eavesdropping can intercept data being sent wirelessly between apps and organizations. Hackers can also repackage apps, add malicious code to them, and then reload them to app stores — a tactic that has been prevalent with banking apps.Click here to edit the content

Pál Kerékfy's insight:

Azoknak a cégeknek, amelyek mobil alkalmazásokat fejlesztenek vagy használnak: 5 tanács a Gartnertől. Nem világmegváltó dolgok, de érdemes ezekre is gondolni.

#Gartner #security #CISO #mobile

more...
No comment yet.