Also in this playlist...
This transcript is automatically generated
In an increasingly digital and mobile world companies are struggling to keep their information safe and new findings from the security software companies Symantec.
Revealing some eye opening statistic.
Bissau security breaches costs companies and only.
Billion dollars 40%.
Of targeted attacks.
Affect small businesses and overall then number of daily targeted attacks increased.
Year over year or so the question is what can companies due to protect themselves lighted these scary numbers -- now -- Frances d'souza.
Enterprise products and service as president for a Symantec thank you for joining me.
France as I was actually quite surprised to see how much of an issue this is for a small businesses and not just big businesses.
What exactly is a threat impacting smaller and midsize companies.
Sure I thank you for having me -- think.
One of the surprising pieces of news here is that we're seeing digital espionage emerged as one of the primary motivations.
Attacks on line it used to be that hackers are trying to take down corporate networks to become famous and that's really changed today we're seeing.
And growth in the number of sophisticated attackers.
That are really attacking companies to steal information and so the threat for companies is.
How they keep -- very important information safe it's their customer lists.
It's their intellectual property it could be designs that they have.
And what we found actually is that as part of these are taxed on the are there sophisticated attackers but increasingly.
There's the use of an insider as part of the attacks.
Kind of work -- as cyber hacker is trying to get famous by hacking into big enterprises -- -- sort of a different world altogether.
Let's talk about insiders playing a big role in this I know this is an increasing -- so how can companies out there protect themselves.
Sure you -- we're seeing about half of all attacks actually -- some use of insider's our research actually shows now that.
The highest risk period is -- the last couple of weeks after an employee has made a decision to move in in some cases actually notified their current employer.
That they're gonna take on a new job.
But they're still at their job and in fact about 75% of all the breaches.
The employee had legitimate access to the information they then went on to steal.
And so -- -- as you think about how to prevent this there's no one Sylva bullet bullet.
The the preventative measures involve looking at the people the process to technology from a people perspective.
It's pretty important to actually do -- things like background searches and bring human resource is into the equation as part of your security posture.
From a process perspective it's important.
To understand what information people should have access to.
After they've decided to move on.
And that from a technology perspective.
Really understand what kind of protections you want to have.
To secure the information may be -- important information encrypted and then also understand what kind of monitoring is appropriate.
To make sure that.
The the right things are happening with that information.
-- you make a strong case for beefing up security no matter what type of business owner you -- -- corporate budgets are tight so what is C elevator pitch to our viewers a lot of them are small business owners.
An elevator pitch to get -- to act today and also throwing may be -- -- -- too because I think that you know sometimes.
The free -- is the easiest way take to get your toes and dip them in the water.
So the the importance about IG securities -- that it affects a company's reputation.
And that the the consequences of -- -- -- not only that you might have lost some information.
But in a lot of cases you actually have to notify -- customers.
If there information has to be -- and what we found is that.
Back to have a significant reputation -- impact for a firm especially for a smaller medium -- business.
And that the consequences of a breach could be things like you know lost business -- customers moving on to other companies and so protecting your information.
Has a lot more impact than just keeping that information safe.
Now in terms of you know tips at save the important things to have our.
Of the basic protections around knowing where your most intimate important information is so if you have things like credit card numbers you know where they stored.
Are they encrypted.
I know who has access to them.
Great say it's no who has access to new -- information to make sure information is protected free advice -- all of our viewers can take on today.
France's deceit semantic thank you very much for enlightening us on that issue.
Thank you should --
Filter by section