Product

Put a Stop to the Key Data Breach Culprits

July 18, 2017

In June 2015, the United States Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people. Later, FBI Director James Comey put the number at 18 million. The data breach, which had started in March 2014, and may have started earlier, was noticed by the OPM in April 2015. It has been described by federal officials as among the largest breaches of government data in the history of the United States. Information targeted in the breach included personally identifiable information such as Social Security numbers, as well as names, dates and places of birth, and addresses. The hack went deeper than initially believed and likely involved theft of detailed security-clearance-related background information.

On July 9, 2015, the estimate of the number of stolen records had increased to 21.5 million. This included records of people who had undergone background checks, but who were not necessarily current or former government employees.

Corporate data breaches are not only big news, but they also come with big—and growing—price tags. The average cost of cleaning up and recovering from a data breach is now $3.79 million, up 23% over the last two years alone.

Blame increasingly sophisticated malware. Using more advanced and targeted tactics, today’s malware has a higher success rate. Add in the growing use of cloud services and the role that internal actors play in data loss—initiating nearly half of all breaches, many unintentionally—and it’s clear that simply trying to stop hackers from getting access to your traditional network isn’t enough.

Instead, an effective data protection strategy must combine strong encryption, data loss prevention, centralized management, and common security policies that govern the flow and use of data across all your environments from on-premises applications and endpoints to file servers and cloud applications.

Implement strong data protection technologies

With data protection technologies recognized as a leader by Gartner, we provide a full suite of data loss prevention, enterprise-grade encryption, native encryption, support for mobile encryption, and file and removable media protection.

Extend your data security

Widen data protection policies and enforcement to cover your entire IT footprint, including on-premises endpoints, file servers, and cloud services.

Make data unusable to outsiders

Lock down critical data with powerful enterprise-grade drive encryption or native encryption management on Windows and OS X systems. If a breach occurs, encryption technologies help to ensure that any data accessed is unusable to hackers.

Streamline data protection policies

Enable consistent policy deployment and enforcement, and robust reporting and incident workflow, all from a central security management platform.


Whatever your device, we’ve got your back

Feature icon PC
Feature icon Laptop
Feature icon Phone

Sitemap  |  Copyright © 2017 TechLow, LLC  |  All brand trademarks, service marks, registered trademarks
or registered service marks are the property of their respective owners