SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Think you’re secure?
Why you may be surprised.
With more than 50,000 security threats emerging each day, IT managers like
you have a challenging job. Even with carefully crafted policies, the biggest threat
may come from inside your organization. Firewalls, anti-virus software, rules and
regulations can only do so much. The final barrier is employee behavior and, when
you’re waging the war against laid-back attitudes, culprits can be everywhere.

Who’s not worried?

Almost two-thirds of
U.S. employees never
or rarely worry about
confidential information
remaining secure.

Why you should be:

51

%

vs.

68 55
%

of women

76

%

57

%

of men

%

of households
earning $35k–$49.9k

of workers copy,
scan or print
confidential work

of households
earning $75k+

78

%

70

%

54

%

of westerners

of workers are not
prompted to enter
a password

of northeasterners

Who’s ignoring the rules?
1 in 10 rarely or never
follow the policy

“I didn’t know there was a policy.”

2 in 10 are not aware
a policy even exists

vs.
24% of women

30

%

18- to 34-year-olds are nearly
twice as likely to indicate this
than any other age group

Security policy awareness
appears to improve with
household income.

of those with
a high school
degree or less

8% of men

18

%

of those with some
college education
or more

36%
% unaware

87% of employees work at a company that
has an IT security policy—however:

29%
21%
13%

$35k
or less

$35k–
$49.9k

$50k–
$74.9k

$75k+

What can you do?
With the right balance of technology, people and process,
you can protect sensitive data wherever it resides.

Make your IT security policy more than a written
document. Communicate the how and the why
regularly and require your policy to be part of dayto-day procedures through supporting technology.
Nothing does more than a proactive approach to
policy awareness and adherence. When you think
you’ve kicked worry to the wayside, think again—
the threats are all around and always changing.
And security is everyone’s responsibility.
For more about how Xerox can help,
visit xerox.com/security.

Source: Based on the IT/MFP Security Study conducted by Harris Interactive, 2012.
©2012 Xerox Corporation. All rights reserved. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. BR2824

Más contenido relacionado

La actualidad más candente

Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
Chris Hewitt
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 

La actualidad más candente (12)

7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
 

Destacado

Destacado (8)

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We Work
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots Infographic
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement Infographic
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place Anymore
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]
 

Similar a Think you’re secure? You May Be Surprised

GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 

Similar a Think you’re secure? You May Be Surprised (20)

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
State of Security
State of SecurityState of Security
State of Security
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security Expert
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 

Más de Chief Optimist

Más de Chief Optimist (12)

Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace Revealed
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government Revealed
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace Revealed
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher Education
 
Information Security
Information SecurityInformation Security
Information Security
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print Services
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Think you’re secure? You May Be Surprised

  • 1. Think you’re secure? Why you may be surprised. With more than 50,000 security threats emerging each day, IT managers like you have a challenging job. Even with carefully crafted policies, the biggest threat may come from inside your organization. Firewalls, anti-virus software, rules and regulations can only do so much. The final barrier is employee behavior and, when you’re waging the war against laid-back attitudes, culprits can be everywhere. Who’s not worried? Almost two-thirds of U.S. employees never or rarely worry about confidential information remaining secure. Why you should be: 51 % vs. 68 55 % of women 76 % 57 % of men % of households earning $35k–$49.9k of workers copy, scan or print confidential work of households earning $75k+ 78 % 70 % 54 % of westerners of workers are not prompted to enter a password of northeasterners Who’s ignoring the rules? 1 in 10 rarely or never follow the policy “I didn’t know there was a policy.” 2 in 10 are not aware a policy even exists vs. 24% of women 30 % 18- to 34-year-olds are nearly twice as likely to indicate this than any other age group Security policy awareness appears to improve with household income. of those with a high school degree or less 8% of men 18 % of those with some college education or more 36% % unaware 87% of employees work at a company that has an IT security policy—however: 29% 21% 13% $35k or less $35k– $49.9k $50k– $74.9k $75k+ What can you do? With the right balance of technology, people and process, you can protect sensitive data wherever it resides. Make your IT security policy more than a written document. Communicate the how and the why regularly and require your policy to be part of dayto-day procedures through supporting technology. Nothing does more than a proactive approach to policy awareness and adherence. When you think you’ve kicked worry to the wayside, think again— the threats are all around and always changing. And security is everyone’s responsibility. For more about how Xerox can help, visit xerox.com/security. Source: Based on the IT/MFP Security Study conducted by Harris Interactive, 2012. ©2012 Xerox Corporation. All rights reserved. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. BR2824