Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Understand Cybersecurity and Safeguard Your Most Important Asset: Information

Understand Cybersecurity and Safeguard Your Most Important Asset: Information

Ratings: (0)|Views: 28 |Likes:
Published by Motorola Solutions

More info:

Published by: Motorola Solutions on Aug 20, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/20/2012

pdf

text

original

 
 WHITE PAPER
CYBERSECURITY: MANAGING THE COMPLEXITY
CYBERSECURITYMANAGING THECOMPLEXITY
SAFEGUARDYOUR MOSTIMPORTANT ASSET:INFORMATION
According to McAee
®
, 60,000,000 malware programs are writtenevery year as cybercriminals continue to push the envelope.
1
 Even worse, corporate and government-sponsored computerespionage is an escalating problem on an international scale, ashackers use even more sophisticated methods to bypass securityramparts. Protecting your data is as important as protecting yourcash – because anything that threatens your inormation systemsthreatens your enterprise.What i condential inormation about your customers, agencymembers, nances or classied projects ell into the wrong hands?You could lose your competitive advantage at best or suersignicant losses at worst. A security breach that catapults yourcompany into the headlines would not only damage your reputationand credit rating, but expose it to lawsuits and even bankruptcy.
MALWARE PROGRAMS ARE WRITTEN EVERY YEAR BYCYBERCRIMINALS
1
 
60
MILLION
 
 WHITE PAPER
CYBERSECURITY: MANAGING THE COMPLEXITY
2
SECURITY RISKS COME WITH AHIGH PRICE
Attacks and breaches o your inormation systems are costly, whether it’s operational losses while you identiy and rectiy the problem or time and moneyto rehabilitate your image. Add in the strict compliance requirements that are being enorced in practically every industry – along with steep nes and stipenalties – and proactively managing risk can save your organization innumerable complications and costs.Done right, cybersecurity proactively manages risk. It saeguards critical inormation assets, ensures data integrity and protects the condentiality oinormation. It also gives your organization the ability to retain evidence and prosecute eectively.
CYBERSECURITY PUTS POLICIES, PROCEDURESAND TECHNICAL MECHANISMS IN PLACE TOPROTECT, DETECT AND CORRECT PROBLEMSBEFORE THEY THREATEN YOUR NETWORK.
 
ARE YOU PREPARED?
DID YOU KNOW
Moving rom legacy analog to a highly-efcient, digital IP-based network increases complexity and introduces new risks
Inormation-sharing and interoperability adds even more vulnerabilities
Compliance and regulatory mandates are evolving and oten tied to grant unding
Breaches can result in negative publicity, fnancial loss and political implications
Government budgets are decreasing while requirements or improved security are increasing
 
 WHITE PAPER
CYBERSECURITY: MANAGING THE COMPLEXITY
3
Advanced computing power and anywhere connectivity are in the palm o ourhands, literally. Business devices connect us to smartphones, digital two-wayradio systems and location-based asset management systems that helpmobile workers keep in touch with the home oce. Digital cameras uploadimages to the cloud, gaming systems let us compete with players anywherein the world, and smartphones turn on lights and appliances remotely.Anywhere connectivity has changed our expectations about the way weaccess inormation at work. Telecommuting is mainstream. Mobile data ismission-essential. Twitter and Pinterest are moving rom social media tobusiness tools. Centralized network lockup has become impossible. Anddata is growing aster than the ability o the network to handle it – with 667exabytes travelling over the Internet annually by 2013, according to Cisco.
3
 At the same time, employees are bringing their own devices to work andexposing enterprise networks to a new world o vulnerabilities. People aremore procient than ever with technology and more dependent on theirmobile devices. Unortunately, most are naïve about their role in securing thedevices and data you rely on – and that is an enormous risk.
MOBILITY IS CHANGING EVERYTHING,ANDCHALLENGING EVERYONE
GOVERNMENT NETWORKS: HOT TARGET FOR HACKERS
Hackers are targeting government networks as they go ater high-value intellectual property, andincreasingly their attacks originate in oreign countries. A highly specialized worm, such as the Stuxnetcomputer virus, is a sophisticated cyber attack tool that shut down a nuclear acility’s entire networkand is now viewed as a super weapon.
2
 
667
 
EXABYTES
 WITH
667
EXABYTES OF DATATRAVELLING OVER THEINTERNET ANNUALLY,DATA USAGE IS GROWINGFASTER THANTHE NETWORKCAN HANDLE
3

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->