SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Think you’re secure?
Why you may be surprised.
With more than 50,000 security threats emerging each day, IT managers like
you have a challenging job. Even with carefully crafted policies, the biggest threat
may come from inside your organization. Firewalls, anti-virus software, rules and
regulations can only do so much. The final barrier is employee behavior and, when
you’re waging the war against laid-back attitudes, culprits can be everywhere.

Who’s not worried?

Almost two-thirds of
U.S. employees never
or rarely worry about
confidential information
remaining secure.

Why you should be:

51

%

vs.

68 55
%

of women

76

%

57

%

of men

%

of households
earning $35k–$49.9k

of workers copy,
scan or print
confidential work

of households
earning $75k+

78

%

70

%

54

%

of westerners

of workers are not
prompted to enter
a password

of northeasterners

Who’s ignoring the rules?
1 in 10 rarely or never
follow the policy

“I didn’t know there was a policy.”

2 in 10 are not aware
a policy even exists

vs.
24% of women

30

%

18- to 34-year-olds are nearly
twice as likely to indicate this
than any other age group

Security policy awareness
appears to improve with
household income.

of those with
a high school
degree or less

8% of men

18

%

of those with some
college education
or more

36%
% unaware

87% of employees work at a company that
has an IT security policy—however:

29%
21%
13%

$35k
or less

$35k–
$49.9k

$50k–
$74.9k

$75k+

What can you do?
With the right balance of technology, people and process,
you can protect sensitive data wherever it resides.

Make your IT security policy more than a written
document. Communicate the how and the why
regularly and require your policy to be part of dayto-day procedures through supporting technology.
Nothing does more than a proactive approach to
policy awareness and adherence. When you think
you’ve kicked worry to the wayside, think again—
the threats are all around and always changing.
And security is everyone’s responsibility.
For more about how Xerox can help,
visit xerox.com/security.

Source: Based on the IT/MFP Security Study conducted by Harris Interactive, 2012.
©2012 Xerox Corporation. All rights reserved. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. BR2824

Contenu connexe

Tendances

7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat ReportChris Hewitt
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity TrendsMarco
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?eLeaP
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityCareer Communications Group
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...Ronald Harrison
 

Tendances (12)

7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
How secure is your company's information?
How secure is your company's information?How secure is your company's information?
How secure is your company's information?
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Information Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in CybersecurityInformation Is Power! Using Defensive Solutions in Cybersecurity
Information Is Power! Using Defensive Solutions in Cybersecurity
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
How organisations can_avoid_data_breaches_and_thus_meet_their_security_obliga...
 

En vedette

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkChief Optimist
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...Chief Optimist
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Chief Optimist
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicChief Optimist
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Chief Optimist
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicChief Optimist
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place AnymoreChief Optimist
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Chief Optimist
 

En vedette (8)

How Mobility is Changing the Way We Work
How Mobility is Changing the Way We WorkHow Mobility is Changing the Way We Work
How Mobility is Changing the Way We Work
 
The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...The Automated States of America: Transforming the Future of Government IT [In...
The Automated States of America: Transforming the Future of Government IT [In...
 
Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]Green Printing at UK Government Department [Infographic]
Green Printing at UK Government Department [Infographic]
 
Finding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots InfographicFinding the Retail Omnichannel Sweet Spots Infographic
Finding the Retail Omnichannel Sweet Spots Infographic
 
Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]Government Data Breaches: An Inside Job? [Infographic]
Government Data Breaches: An Inside Job? [Infographic]
 
Higher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement InfographicHigher Education Student Retention and Achievement Infographic
Higher Education Student Retention and Achievement Infographic
 
Work is Not a Place Anymore
Work is Not a Place AnymoreWork is Not a Place Anymore
Work is Not a Place Anymore
 
Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]Financial Group Goes Beyond Document Management [Infographic]
Financial Group Goes Beyond Document Management [Infographic]
 

Similaire à Think you’re secure? You May Be Surprised

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youthnirmal00776
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakesmxotech
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 

Similaire à Think you’re secure? You May Be Surprised (20)

The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
State of Security
State of SecurityState of Security
State of Security
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
Mayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security ExpertMayur Rele - How to become a Cyber Security Expert
Mayur Rele - How to become a Cyber Security Expert
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 

Plus de Chief Optimist

Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Chief Optimist
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedChief Optimist
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government RevealedChief Optimist
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedChief Optimist
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS AssessmentChief Optimist
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Chief Optimist
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationChief Optimist
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesChief Optimist
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.Chief Optimist
 

Plus de Chief Optimist (12)

Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]Take the Stop and Go out of your Retail Supply Chain [Infographic]
Take the Stop and Go out of your Retail Supply Chain [Infographic]
 
Optimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace RevealedOptimism in the Healthcare Workplace Revealed
Optimism in the Healthcare Workplace Revealed
 
Optimism in Government Revealed
Optimism in Government RevealedOptimism in Government Revealed
Optimism in Government Revealed
 
Optimism in the Modern Workplace Revealed
Optimism in the Modern Workplace RevealedOptimism in the Modern Workplace Revealed
Optimism in the Modern Workplace Revealed
 
26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment26 Reasons You Need an MPS Assessment
26 Reasons You Need an MPS Assessment
 
Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)Four Necessities for Your Change Management Journey (Infographic)
Four Necessities for Your Change Management Journey (Infographic)
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Generating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher EducationGenerating Revenue and Reducing Costs in Higher Education
Generating Revenue and Reducing Costs in Higher Education
 
Information Security
Information SecurityInformation Security
Information Security
 
Business Goes Mobile
Business Goes MobileBusiness Goes Mobile
Business Goes Mobile
 
Workflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print ServicesWorkflow and The True Value of Managed Print Services
Workflow and The True Value of Managed Print Services
 
Change is good...when you manage it properly.
Change is good...when you manage it properly.Change is good...when you manage it properly.
Change is good...when you manage it properly.
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Think you’re secure? You May Be Surprised

  • 1. Think you’re secure? Why you may be surprised. With more than 50,000 security threats emerging each day, IT managers like you have a challenging job. Even with carefully crafted policies, the biggest threat may come from inside your organization. Firewalls, anti-virus software, rules and regulations can only do so much. The final barrier is employee behavior and, when you’re waging the war against laid-back attitudes, culprits can be everywhere. Who’s not worried? Almost two-thirds of U.S. employees never or rarely worry about confidential information remaining secure. Why you should be: 51 % vs. 68 55 % of women 76 % 57 % of men % of households earning $35k–$49.9k of workers copy, scan or print confidential work of households earning $75k+ 78 % 70 % 54 % of westerners of workers are not prompted to enter a password of northeasterners Who’s ignoring the rules? 1 in 10 rarely or never follow the policy “I didn’t know there was a policy.” 2 in 10 are not aware a policy even exists vs. 24% of women 30 % 18- to 34-year-olds are nearly twice as likely to indicate this than any other age group Security policy awareness appears to improve with household income. of those with a high school degree or less 8% of men 18 % of those with some college education or more 36% % unaware 87% of employees work at a company that has an IT security policy—however: 29% 21% 13% $35k or less $35k– $49.9k $50k– $74.9k $75k+ What can you do? With the right balance of technology, people and process, you can protect sensitive data wherever it resides. Make your IT security policy more than a written document. Communicate the how and the why regularly and require your policy to be part of dayto-day procedures through supporting technology. Nothing does more than a proactive approach to policy awareness and adherence. When you think you’ve kicked worry to the wayside, think again— the threats are all around and always changing. And security is everyone’s responsibility. For more about how Xerox can help, visit xerox.com/security. Source: Based on the IT/MFP Security Study conducted by Harris Interactive, 2012. ©2012 Xerox Corporation. All rights reserved. XEROX® and XEROX and Design® are trademarks of Xerox Corporation in the United States and/or other countries. BR2824