{"id":390,"date":"2006-07-21T02:15:36","date_gmt":"2006-07-20T19:15:36","guid":{"rendered":""},"modified":"2006-07-21T02:15:36","modified_gmt":"2006-07-20T19:15:36","slug":"corporate-risks","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2006\/07\/corporate-risks\/","title":{"rendered":"Corporate Risks"},"content":{"rendered":"<p>What are the odds?<br \/>\n1 in 6 of laptop or PDA stolen<br \/>\n4 in 5 data files stored unencrypted<br \/>\n2 in 3 data files transferred unencrypted<br \/>\n1 in 2 limits users ability to install whatever they please, irrespective<br \/>\nof risks<!--more--><\/p>\n<p>1 in 5 suffered data or network sabotage<br \/>\n1 in 4 not know if computers have been illegally accessed<br \/>\n2 in 5 not keep log of computer security incidents<br \/>\n9 in 10 suffered a computer security incident during the past year<br \/>\nALL enterprises have some software installed on desk tops that computer<br \/>\nstaff not know are there, and would not approve of if they did know<\/p>\n<p>Other common problems<br \/>\n* Systems for security, that are so complicated that no one uses them, are<br \/>\n  as bad as having no security at all,<br \/>\n* Computer systems functionality depends on various configuration files &#8230;<br \/>\n  who has access to them?<br \/>\n* Security needs to be documented, otherwise investigators will assume you<br \/>\n  did not do it<br \/>\n* Employees bring unsecure home systems to the office, plug them into<br \/>\n  corporate systems and guess what? now the corporate systems are<br \/>\n  unsecure.  Example, some employee at a financial institution had a lap top<br \/>\n  from home with the wireless port wide open, plugs it into the system at<br \/>\n  work, which is now wide open over the wireless port<br \/>\n* Each new technology has new security weaknesses unknown to people<br \/>\n  installing them<br \/>\n* Executives consider corporate security rules do not apply to them, they<br \/>\n  are free to break any of them<br \/>\n* People think the laptop breach laws do not apply to other portable<br \/>\n  devices that can carry corporate data &#8230; they are wrong<br \/>\n* Data is backed up, but can it also be restored in a crisis &#8230; there<br \/>\n  should be periodic checks that backups are getting everything they ought to<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corporate Risks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-390","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-6i","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}