AOH :: ISNQ7127.HTM

Downtime Rated Top Risk Of Data Breaches




Downtime Rated Top Risk Of Data Breaches
Downtime Rated Top Risk Of Data Breaches



http://www.informationweek.com/news/security/management/showArticle.jhtml?articleID=228201056 

By Mathew J. Schwartz 
InformationWeek
November 16, 2010

What happens after a data breach, criminals attack the enterprise 
network, or PCs get infected with a virus via Facebook, leading to 
network downtime? According to a new survey: confusion. That's because 
two-thirds of organizations lack the right data or tools to fully 
understand the scope of a security incident, and 35% lack a response 
plan.

Those findings come from a new survey conducted by Trusted Strategies 
for Solera Networks, which sells network monitoring tools. The study 
queried more than 200 security professionals about their organization's 
ability to detect and deal with advanced, persistent threats. Such 
threats often use combinations of attacks to sneak past existing 
security defenses.

"We have seen a shift in the type of threats organizations are having to 
deal with," said Peter Schlampp, VP of marketing and product management 
at Solera Networks, in a statement. "Opportunistic theft and vandalism 
on networks is being replaced with targeted, multi-component, persistent 
attacks focused on specific systems and assets. Results of the study 
clearly show that most organizations are ill prepared to prevent and 
respond to these incidents."

[...]


___________________________________________________________      
Tegatai Managed Colocation: Four Provider Blended
Tier-1 Bandwidth, Fortinet Universal Threat Management,
Natural Disaster Avoidance, Always-On Power Delivery 
Network, Cisco Switches, SAS 70 Type II Datacenter. 
Find peace of mind, Defend your Critical Infrastructure.
http://www.tegataiphoenix.com/ 

Site design & layout copyright © 1986-2014 CodeGods