where in the world is your corporate data?
DESCRIPTION
Do you know where your corporate data is? How many "transfer of hands" does it go through? Read the full blog here: http://bit.ly/1CCoghkTRANSCRIPT
101011010
100101
10101010
0101
1010
10100101101001010
1101
01001010101101001010110101001010
101101001010010110101101001010110100101001010010110
1011010010
10010
11010110100101011010010100101001011010101
1010010
1001011
010110
100
of the workforce is now mobile.
The average employee has 3.3connected devices.
And 70% of professionals use personaldevices to access corporate data.
75%
of IT & IS pros traced the loss of sensitive information
to USB drives.They can also carry malware, which can infect corporate networks with malicious code.
70%
40% of liquid spills arefrom co�ee.
Liquid spills are responsible for of all laptop damages.60%
of employees save corporate files on USB drives.
And most people who find them laying around pick them up and plug them in to see what’s on them.
66%
of all open Wi-Fi networks are susceptible to abuse.
MORE THAN 1/2
of employees use file sharing services for work purposes.72%
Even though 77% of companies prohibit this.
Within the next 3-4 years, more thanof corporate data will reside in the cloud, outside the data center. 50%
More than half of laptops stolen result in data breaches.
1 laptop is stolen
EVERY 53 SECONDS
101101011010100101010010101101010010110101101011010010110
100100100
100110
1101
1010
10110100
10100100
100100
101011010
01011010010010
0101
1010
0101
1010
101011010110
1010010
0100101
0101001001
10101101
01001011010
101001011010
101001011010
010101101010010101011010010101101010010100
1001001
0101101101001010
1010110101001011010101001011010101001
011010
01010110101001010101101001010110101001010010010
0101011HQ
Protect & govern corporate data anywhere, anytime. Learn more at druva.com/inSync
Wi-Fi attack on a public network can take less than two seconds.
www.slideshare.net/DruvaInc/druva-40-scary-stats-about-data-at-riskwww.sewelltech.com/top-10-liquid-spills-kill-laptop-computers/www.tabtimes.com/news/ittech-stats-research/2012/02/10/security-firm-reveals-damage-lost-stolen-laptops-smartphoneswww.slideshare.net/ValaAfshar/50-wi-fitechstatsforbusinessGartner, 2014
Sources: