Anatomy of a Data Breach: Why Breaches Happen and What to Do About It


This paper examines the three most common sources of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders—and goes on to illustrate the ways in which each source gains access to the network, finds and then exposes sensitive information. It also offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.

Download Document: Documents are in common file formats such as Microsoft Word (doc), Powerpoint (ppt), Excel (xls,csv,xlsx), and Adobe pdf.
Download


Related Categories




Related Topics



Related Articles



Posted on 01/29/2013 by


 Anatomy of a Data Breach: Why Breaches Happen and What to Do About It author symantec

symantec

Signup For ThoughtLeader









Subscribe


CIO Index

Our Focus is On Your Agenda

CIO Index is the world's largest professional network for CIOs - of the CIO, for the CIO, by the CIO. 

Over 70,000 CIOs and other IT Executives use CIO Index to Learn, Network and Share.

 

Cioindex, Inc.

  • (+1) 800-309-3550
  • Mon - Fri 9:00am - 5:00 pm
  • 115 Franklin Tpke, Mahwah, NJ 07430