According to a report recently published by Verizon, approximately 85 per cent of thefts of personal data and unauthorized access to restricted information (out of which, 38 per cent is represented by theft of usernames and passwords) can be directly or indirectly linked to organized crime.
Always according to this report, more than 70 per cent of these thefts is perpetrated by outside parties, while 50 per cent of attempts comes from insiders, such as for example collaborators, staff members or business partners, or from an improper use of access credentials, which gave staff the opportunity to take a sneak peek where they should not.
If on one hand, external intrusions exploit weak spots in computer systems, which at times may happen to inadvertently leave a backdoor open, which can be accessed by a hacker, on the other hand inside attacks are a breach of the trust relationship between boss and employees, or between partners.
For this reason, it is absolutely vital to adopt an efficient access control system or procedure, which can unequivocally define who has the right to access to certain data or information, and who doesn’t. For example, still according to Verizon’s report, by adopting simple precautions it is possible to thwart up to 96 per cent of data theft or unauthorized access attempts.
These precautions may range from data protection via encryption and encoding at different levels according to the importance of the data stored, to physical measures to limit access to certain rooms in your workplace and allow only authorized people to get through.
For more information on how to maintain security and privacy of information in your office and workplace, and on several data protection options, we advise that you visit the Endoacustica website.