7 Best Practices to Protect Critical Business Information [Infographic]

Post on 29-Nov-2014

2.062 views 0 download

description

Is your organization ready for today’s security challenges? You need a policy-driven information security approach that you can enforce and monitor. Read this infographic and follow the 7 best practices to protect your company’s critical business information.

Transcript of 7 Best Practices to Protect Critical Business Information [Infographic]

Are You Doing All You CanTo Protect Your CriticalBusiness Information?

Today you need to empower your workforce to work anywhere, anytime, on any device. At the same time, you need to do everything you can to protect critical business information —particularly given the speed, sophistication and severe consequences of today’s attacks.

Today’s attackers act quickly

of breachesremain undiscoverd

for months.

of breachesare discoveredby the affected

company.

84% 66% 13%of intrusions

take minutes.

Today’s attackers are smart,and they don’t rely on one tactic

19% of breaches combine phishing, malware,hacking and entrenchment.

Security incidents resulting inlosses of more than

$10 Millionare up 51% from 2011.

One big problem is that while security risks have

dramatically evolved, security strategies—

typically compliance-based and perimeter-oriented—

haven’t kept pace. In other words, most organizations

are now defending yesterday, even as their

adversaries exploit the threats of tomorrow.

The attack surface has expanded

The attack surface has expanded as anever-greater volume of data flowsthrough multiple channels – includingto partners, suppliers, customersand others.

And hot-button technologies likecloud computing, mobility, and BYODare often implemented before theyare fully secured.

Given today’s constantly shifting technology landscape, IT must be able to simplifysecurity, protect intellectual property, ensure data privacy, and meet compliance mandates while providing employees with the appropriate level of secure access andcollaboration they need to get their work done.

Security technologies are critical

89%of IT decision makers said security technologiesare now critical or important to creatingbusiness advantages.

What’s needed is a policy-driven approach to information security. One that’s informed by an understanding of threats, high-value information, and the motives and targets of potential adversaries. Then you need toenforce this policy framework and monitor it continuously.

Follow these 7 best practices toprotect your critical business information:

Take a modern, mobile and ser-vices-based view ofsecurity policies. Enforcepolicies consistently acrossuser and usage models.

Automate securityseamlessly – building desired behaviors into the userexperience – and monitor your effectiveness continuously. 

Engage with line of business organizationsto ensure that security is core to all information technology initiatives.

Focus on comprehensive security that protects across data, applications, devices, networks and usage. 

Educate users – that means making securitypersonal and specific to the job people are doing.

Audit, measure and report on security effectiveness across governance, compliance and risk management programs.

Architect and maintain aninformation technology foundation that builds securitydirectly into the business solution.

Citrix empowers secured accessto information for people whereverthey may work. To learn more, go to:

citrix.com/secure

Works Cited:1–4 Verizon 2013 Data Breach Investigations Report5-7, 2014 Global State of Information Security Survey, conducted by PwC, CIO and CSO magazines 8 State of the Enterprise 2013, IDG Research

1

2

3

4

5

6

7

8

Is your organization up to the challenge?

=

Security technologies Business advantages

1

3

1

2 36

33

35

37

34