NOVEMBER 29, 2013
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Storm of Scams: Cybercriminals Take Advantage of Typhoon Haiyan

Security for Home Users
The Season for Danger: Holiday Threats

Security for Business
Data Theft Security Risks



Security for Business

Data Theft Security Risks

Securing your corporate network is the first crucial step in combating targeted attacks.”



Mobile platform use in your network and targeted attacks introduce risks like theft and loss to confidential corporate data. A study, in fact, revealed that preventing the exposure of confidential data is a major challenge for organizations and large enterprises. As such, enterprises need to protect their “crown jewels” more than ever, as losing these could have dire consequences.

Here are some real-world consequences that can result from failing to protect your data:

  • Incident response and crisis management cost. This refers to money and resources any company shoulders to discover how an attack against it happened, what data was stolen, and what other damages it sustained.

  • Compliance-related penalties. If your organization uses industrial control systems (ICS) and it’s required to adhere to certain regulations, chances are you will be fined if you suffer a breach.

  • Intangible sunk costs. Money invested in research and development (R&#amp;D) and on trade secrets, the theft of which can result in loss of competitive advantage.

How to Help Protect Your Organization’s “Crown Jewels”

Securing your corporate network is the first crucial step in combating targeted attacks. To prevent these from reaching the data exfiltration stage, early detection is key. We also recommend the use of a custom defense strategy that can detect threats in real time. Here are additional steps you can take to secure your valuable data:

  • Separate “crown jewels” from normal data. Crown jewels like government data, scientific research, and pharmaceutical formulas should be separated from day-to-day documentation. It’s also advisable to use privilege access in certain systems when it comes to sharing and downloading highly confidential data.

  • Implement endpoint-to-cloud protection. We recommend that you encrypt files, disks, and removable media to protect mobile devices, laptops, and removable devices. Encrypt data when you use applications in either private or public clouds.

  • Build a data protection infrastructure. To secure data, implement a system with multitiered access. In this structure, top-level information is not connected to the network while other types of data require an authentication process, among others.

Copyright ©2013 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: