SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
The State of
Data Security:
How to Prepare for 2017
DATA JUST
KEEPS GROWING
90%of data that exists today
was created in the
PAST 2 YEARS.
1
2.5 QUINTILLIONbytes of data are created each day, growing at a rate
FOUR TIMES FASTER than the world’s economy.1
This massive amount of data allows organizations to take a
more qualitative approach to business and customer
service, but also makes them vulnerable to a continually
increasing number of threats.1
THREATS KEEP
GROWING TOO
MORE THAN
353 MILLION
infected files are exposed
to networks each day.2
TOTAL MALWARE
by the end of 2015 reached nearly
500 MILLION.
2
Ransomware generated
$209 MILLION
for cybercriminals in the first three months of 20163
with an average of
4,000
ransomware attacks each day4
and
9,515
ransoms paid every month5
“The largest threat is still your end user and their willingness
to click on links and attachments in emails.”
– Jason Beltrame, Systems Engineer at CISCO
We saw a significant spike in Ransomware attacks and many of
these were a result of a Phishing scam where the end user
clicked on a link/email attachment that looked as if it came
from a reputable sender (inside the organization).”
– Adam Kaplan, Regional Security Account Manager at CISCO
The biggest security threat in
2016 is the inability to enforce a
least-privilege security model.”6
- Michael Broadwood, Varonis
BREACHES ARE COSTING
BUSINESSES MONEY!
IN 60%
of data breach cases, attackers are able to
compromise an organization in minutes.7
The average cost of a data breach is now
$3.8 MILLION
with an average estimated cost of
$154 per stolen record.8
2014 - Yahoo was compromised by a data
breach and confirmed at least 500 million
user accounts had been stolen in what may
be the biggest data breach of all time.10
2015 - The United States Office of
Personnel Management had 21.5 million
background investigation records of
current, former, and prospective Federal
employees and contractors stolen. The
personnel data of 4.2 million current and
former Federal employees was stolen.11
2012 - Dropbox was hacked and 68
million user accounts were leaked
online with their associated passwords.9
2016 - a number of BuzzFeed’s posts were
vandalized by a group of hackers called
OurMine after publishing a story threatening
to expose one of the members.12
Real World Examples
WHY DOES THIS
KEEP HAPPENING?
Organizations need to realize that continuing to invest
in “business as usual” IT security tools is no longer
enough to protect critical data.”
- 2016 Vormetric Data Threat Report
Attacks are getting more and more unique, targeted
and sophisticated, making it impossible for legacy
detection based solutions to capture.”
- Brian Feller, Avecto
It's not so much people not realizing
they're vulnerable than it is they don't
believe they're a target. The fact is,
anybody can be a target.”
- Lance Spitzner, founder of The Honeynet Project
If data is stored in the cloud (AWS, box, salesforce), your data is not
automatically safe. It’s a shared responsibility between the cloud
vendor and the customer to protect that data.”
– Jason Beltrame, Systems Engineer at CISCO
Most companies are overlooking that fact that their users are more
of a security risk than the outside world anymore.”
– Adam Kaplan, Regional Security Account Manager at CISCO
Critical finding illustrate organizations continue to equate compliance with
security in the belief that meeting compliance requirements will be enough”
- 2016 Vormetric Data Threat Report
Organizational Security Holes
Contribute to Incidents
3,571
47%
30%
< 1%
Around
55%
1 in 6
Insider
Incidents
A majority of the 3,571 services
used by surveyed organizations
lacked basic security features.13
1 in every 6 users will misuse or
expose data.14
Insider incidents are the hardest
(and take the longest) to detect.
Of all the incidents, these insider
misuse cases are the most likely to
take months or years to discover.15
47% of companies report users
having excessive right.14
30% of phishing messages
are opened.14
Less than 1% of severe/critical
security alerts are investigated.14
Around 55% of all businesses
acknowledge that they secure
credit card information but not Social
Security numbers, bank account
details, and other personal data.16
Fragmented cloud service
use increases risk!
Organizations use an average of 24 different file sharing
services and 91 different collaboration services,
resulting in greater risk since 60% of the file sharing
services used are high risk services.17
No business is too small to evade
a cyber attack or data breach.”
- Ponemon Institute
WHAT ARE IT
DEPARTMENTS DOING
ABOUT THIS?
Businesses have been steadily
increasing spending in
network security since 2007.
But SMB personnel, budget, and technologies are insufficient to
have a strong security posture. So, some SMBs engaged
managed security service providers to support an average of
34% of their IT security operations.18
WHAT DO EXPERTS
RECOMMEND?
Organizations can make
immediate improvements by:
Consider an “encrypt everything” strategy.
Implement an end-to-end security solution
that addresses a variety of use cases.
Implement analytics to start identifying
threatening patterns of data use.19
1
2
3
Enterprises of all shapes and sizes need to evaluate their
security strategy when related to the end-points. Once an
attacker has gained access, in many cases they have the
proverbial “keys to the kingdom.”
- Brian Feller, Avecto
Water finds cracks, thus the foundation of any security
architecture requires the end-points (PCs, laptops, Macs)
to be locked-down on an enterprise level, whether you
have 10 or 10,000 users.
- Brian Feller, Avecto
Spend
75%of IT budgets on
RISK PLANNING.
20
Customers must look at the threat
as dynamic and always changing.”
- Adam Kaplan, Regional Security Account Manager at CISCO
Organizations live and die by public
perception, so layering in security at
all levels of business is becoming
the only true insurance.”
- Varonis
The need for security at all phases of the attack
continuum is important. Having products as
well as remediation efforts in place to defend
against the threat before it occurs, while it’s
occurring, and after the breach is a great
philosophy to prevent breaches and limit the
spread in the inevitability of an outbreak.”
– Jason Beltrame, Systems Engineer at CISCO
Predictions for the Future?
“Customers will continue to store their
information in the cloud with Box, Salesforce,
AWS and other cloud based solutions and the
need for cloud access security broker (CASB)
solutions will increase.”
– Jason Beltrame, Systems Engineer at CISCO
“End-users will continue to be targeted as
the primary attack surface.”
- Brian Feller, Avecto
“Ransomware will continue to grow
and spread.”
– Adam Kaplan, Regional Security Account
Manager at CISCO
1
2
3
Predictions for the Future?
80% of new deals for cloud-based CASB
will be packaged with network firewall,
secure web gateway (SWG) and web
application firewall (WAF) platforms.21
The need to prevent data breaches
from public clouds will drive 20% of
organizations to develop data security
governance programs.21
BY
2018
BY
2020
Better security in the
enterprise will lead to more
attacks on employees as
they work from home.
(McAfee Labs 2016 Threat Predictions)
1
VCloudNews
2
McAfee Quarterly Threat Report — March 2016
3
According to the U.S. Department of Justice
4
Multiple U.S. Government departments
5
According to Cisco’s 2016 Annual Security Report
6
Pomemon Institute
7
2015 Verizon Data Breach Investigations Report
8
Cyberwurx, 2016
9
4 Year Old Dropbox Hack Linked 68 Million Users’ Data
10
Yahoo Hackers Stole 500 Million User Accounts in 2014
11
Cybersecurity Incidents
12
Buzzfeed Hacked by OurMine After Exposing Member
13
Skyhigh Cloud Adoption & Risk Report
14
Imperva
15
Verizon 2016 Data Breach Investigations Report (DBIR)
16
Imperva and the Ponemon Institute
17
Skyhigh Cloud Adoption & Risk Report
18
The 2016 State of SMB Cybersecurity Report by Ponemon Institute
19
2016 Vormetric Data Threat Report
19
TechTarget
20
Top 10 Security Predictions 2016
Sources:
The need for increased IT security is clear. Businesses
must adapt to meet these evolving IT security threats
with a unified, connected solution.
If you’re interested in learning how to protect your organization from malware,
breaches and other IT security threats get started today by downloading,
“Security, Manageability, and Reliability: The Keys to Safe Data.”
Download Guide
5 Tower Bridge, 300 Barr Harbor Drive, Suite 705, West Conshohocken, PA 19428
866.797.3282 www.razor-tech.com    

Contenu connexe

Tendances

Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019SrikanthRaju7
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderCSI Solutions
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksSangram Gayal
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioCyberGroup
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 

Tendances (20)

Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
The Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services ProviderThe Benefits of Security From a Managed Services Provider
The Benefits of Security From a Managed Services Provider
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 

En vedette

Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Reviewresultsig
 
A Hacker's perspective on ransomware
A Hacker's perspective on ransomwareA Hacker's perspective on ransomware
A Hacker's perspective on ransomwareAvecto
 
Applied Machine learning for data exfiltration and other fun topics
Applied Machine learning for data exfiltration and other fun topicsApplied Machine learning for data exfiltration and other fun topics
Applied Machine learning for data exfiltration and other fun topicsPriyanka Aash
 
Machine Learning 101
Machine Learning 101Machine Learning 101
Machine Learning 101Talha Obaid
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UKGary Chambers
 
Containing the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemicContaining the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemicAvecto
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
Machine learning & security. Detect atypical behaviour in logs
Machine learning & security. Detect atypical behaviour in logsMachine learning & security. Detect atypical behaviour in logs
Machine learning & security. Detect atypical behaviour in logsAlexander Melnychuk
 
Interventional clinical trials: Procedures
Interventional clinical trials: ProceduresInterventional clinical trials: Procedures
Interventional clinical trials: ProceduresArete-Zoe, LLC
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03Akash Kamble
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EUArete-Zoe, LLC
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureKim Jensen
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with HadoopCloudera, Inc.
 

En vedette (20)

Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
CyberScope - 2015 Market Review
CyberScope - 2015 Market ReviewCyberScope - 2015 Market Review
CyberScope - 2015 Market Review
 
Privilege Management Solution
Privilege Management SolutionPrivilege Management Solution
Privilege Management Solution
 
A Hacker's perspective on ransomware
A Hacker's perspective on ransomwareA Hacker's perspective on ransomware
A Hacker's perspective on ransomware
 
Applied Machine learning for data exfiltration and other fun topics
Applied Machine learning for data exfiltration and other fun topicsApplied Machine learning for data exfiltration and other fun topics
Applied Machine learning for data exfiltration and other fun topics
 
Machine Learning 101
Machine Learning 101Machine Learning 101
Machine Learning 101
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Containing the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemicContaining the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemic
 
Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
Machine learning & security. Detect atypical behaviour in logs
Machine learning & security. Detect atypical behaviour in logsMachine learning & security. Detect atypical behaviour in logs
Machine learning & security. Detect atypical behaviour in logs
 
Interventional clinical trials: Procedures
Interventional clinical trials: ProceduresInterventional clinical trials: Procedures
Interventional clinical trials: Procedures
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Green banking
Green bankingGreen banking
Green banking
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 

Similaire à The State of Data Security

Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docxalinainglis
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Steve Fantauzzo
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 

Similaire à The State of Data Security (20)

Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
56 JULY 2017 WWW.COM.docx
56                   JULY 2017                     WWW.COM.docx56                   JULY 2017                     WWW.COM.docx
56 JULY 2017 WWW.COM.docx
 
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
Ransomware and Emerging Cyber Threats: Why It's More Than Just An IT Problem ...
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 

Dernier

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Dernier (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

The State of Data Security

  • 1. The State of Data Security: How to Prepare for 2017
  • 3. 90%of data that exists today was created in the PAST 2 YEARS. 1
  • 4. 2.5 QUINTILLIONbytes of data are created each day, growing at a rate FOUR TIMES FASTER than the world’s economy.1 This massive amount of data allows organizations to take a more qualitative approach to business and customer service, but also makes them vulnerable to a continually increasing number of threats.1
  • 6. MORE THAN 353 MILLION infected files are exposed to networks each day.2
  • 7. TOTAL MALWARE by the end of 2015 reached nearly 500 MILLION. 2
  • 8. Ransomware generated $209 MILLION for cybercriminals in the first three months of 20163 with an average of 4,000 ransomware attacks each day4 and 9,515 ransoms paid every month5
  • 9. “The largest threat is still your end user and their willingness to click on links and attachments in emails.” – Jason Beltrame, Systems Engineer at CISCO We saw a significant spike in Ransomware attacks and many of these were a result of a Phishing scam where the end user clicked on a link/email attachment that looked as if it came from a reputable sender (inside the organization).” – Adam Kaplan, Regional Security Account Manager at CISCO
  • 10. The biggest security threat in 2016 is the inability to enforce a least-privilege security model.”6 - Michael Broadwood, Varonis
  • 12. IN 60% of data breach cases, attackers are able to compromise an organization in minutes.7 The average cost of a data breach is now $3.8 MILLION with an average estimated cost of $154 per stolen record.8
  • 13. 2014 - Yahoo was compromised by a data breach and confirmed at least 500 million user accounts had been stolen in what may be the biggest data breach of all time.10 2015 - The United States Office of Personnel Management had 21.5 million background investigation records of current, former, and prospective Federal employees and contractors stolen. The personnel data of 4.2 million current and former Federal employees was stolen.11 2012 - Dropbox was hacked and 68 million user accounts were leaked online with their associated passwords.9 2016 - a number of BuzzFeed’s posts were vandalized by a group of hackers called OurMine after publishing a story threatening to expose one of the members.12 Real World Examples
  • 14. WHY DOES THIS KEEP HAPPENING?
  • 15. Organizations need to realize that continuing to invest in “business as usual” IT security tools is no longer enough to protect critical data.” - 2016 Vormetric Data Threat Report Attacks are getting more and more unique, targeted and sophisticated, making it impossible for legacy detection based solutions to capture.” - Brian Feller, Avecto
  • 16. It's not so much people not realizing they're vulnerable than it is they don't believe they're a target. The fact is, anybody can be a target.” - Lance Spitzner, founder of The Honeynet Project
  • 17. If data is stored in the cloud (AWS, box, salesforce), your data is not automatically safe. It’s a shared responsibility between the cloud vendor and the customer to protect that data.” – Jason Beltrame, Systems Engineer at CISCO Most companies are overlooking that fact that their users are more of a security risk than the outside world anymore.” – Adam Kaplan, Regional Security Account Manager at CISCO Critical finding illustrate organizations continue to equate compliance with security in the belief that meeting compliance requirements will be enough” - 2016 Vormetric Data Threat Report
  • 18. Organizational Security Holes Contribute to Incidents 3,571 47% 30% < 1% Around 55% 1 in 6 Insider Incidents A majority of the 3,571 services used by surveyed organizations lacked basic security features.13 1 in every 6 users will misuse or expose data.14 Insider incidents are the hardest (and take the longest) to detect. Of all the incidents, these insider misuse cases are the most likely to take months or years to discover.15 47% of companies report users having excessive right.14 30% of phishing messages are opened.14 Less than 1% of severe/critical security alerts are investigated.14 Around 55% of all businesses acknowledge that they secure credit card information but not Social Security numbers, bank account details, and other personal data.16
  • 19. Fragmented cloud service use increases risk! Organizations use an average of 24 different file sharing services and 91 different collaboration services, resulting in greater risk since 60% of the file sharing services used are high risk services.17
  • 20. No business is too small to evade a cyber attack or data breach.” - Ponemon Institute
  • 21. WHAT ARE IT DEPARTMENTS DOING ABOUT THIS?
  • 22. Businesses have been steadily increasing spending in network security since 2007. But SMB personnel, budget, and technologies are insufficient to have a strong security posture. So, some SMBs engaged managed security service providers to support an average of 34% of their IT security operations.18
  • 24. Organizations can make immediate improvements by: Consider an “encrypt everything” strategy. Implement an end-to-end security solution that addresses a variety of use cases. Implement analytics to start identifying threatening patterns of data use.19 1 2 3
  • 25. Enterprises of all shapes and sizes need to evaluate their security strategy when related to the end-points. Once an attacker has gained access, in many cases they have the proverbial “keys to the kingdom.” - Brian Feller, Avecto Water finds cracks, thus the foundation of any security architecture requires the end-points (PCs, laptops, Macs) to be locked-down on an enterprise level, whether you have 10 or 10,000 users. - Brian Feller, Avecto
  • 26. Spend 75%of IT budgets on RISK PLANNING. 20
  • 27. Customers must look at the threat as dynamic and always changing.” - Adam Kaplan, Regional Security Account Manager at CISCO
  • 28. Organizations live and die by public perception, so layering in security at all levels of business is becoming the only true insurance.” - Varonis
  • 29. The need for security at all phases of the attack continuum is important. Having products as well as remediation efforts in place to defend against the threat before it occurs, while it’s occurring, and after the breach is a great philosophy to prevent breaches and limit the spread in the inevitability of an outbreak.” – Jason Beltrame, Systems Engineer at CISCO
  • 30. Predictions for the Future? “Customers will continue to store their information in the cloud with Box, Salesforce, AWS and other cloud based solutions and the need for cloud access security broker (CASB) solutions will increase.” – Jason Beltrame, Systems Engineer at CISCO “End-users will continue to be targeted as the primary attack surface.” - Brian Feller, Avecto “Ransomware will continue to grow and spread.” – Adam Kaplan, Regional Security Account Manager at CISCO 1 2 3
  • 31. Predictions for the Future? 80% of new deals for cloud-based CASB will be packaged with network firewall, secure web gateway (SWG) and web application firewall (WAF) platforms.21 The need to prevent data breaches from public clouds will drive 20% of organizations to develop data security governance programs.21 BY 2018 BY 2020
  • 32. Better security in the enterprise will lead to more attacks on employees as they work from home. (McAfee Labs 2016 Threat Predictions)
  • 33. 1 VCloudNews 2 McAfee Quarterly Threat Report — March 2016 3 According to the U.S. Department of Justice 4 Multiple U.S. Government departments 5 According to Cisco’s 2016 Annual Security Report 6 Pomemon Institute 7 2015 Verizon Data Breach Investigations Report 8 Cyberwurx, 2016 9 4 Year Old Dropbox Hack Linked 68 Million Users’ Data 10 Yahoo Hackers Stole 500 Million User Accounts in 2014 11 Cybersecurity Incidents 12 Buzzfeed Hacked by OurMine After Exposing Member 13 Skyhigh Cloud Adoption & Risk Report 14 Imperva 15 Verizon 2016 Data Breach Investigations Report (DBIR) 16 Imperva and the Ponemon Institute 17 Skyhigh Cloud Adoption & Risk Report 18 The 2016 State of SMB Cybersecurity Report by Ponemon Institute 19 2016 Vormetric Data Threat Report 19 TechTarget 20 Top 10 Security Predictions 2016 Sources:
  • 34. The need for increased IT security is clear. Businesses must adapt to meet these evolving IT security threats with a unified, connected solution. If you’re interested in learning how to protect your organization from malware, breaches and other IT security threats get started today by downloading, “Security, Manageability, and Reliability: The Keys to Safe Data.” Download Guide 5 Tower Bridge, 300 Barr Harbor Drive, Suite 705, West Conshohocken, PA 19428 866.797.3282 www.razor-tech.com    