...
Full Bio
Today's Technology-Data Science
250 days ago
How to build effective machine learning models?
250 days ago
Why Robotic Process Automation Is Good For Your Business?
250 days ago
IoT-Advantages, Disadvantages, and Future
251 days ago
Look Artificial Intelligence from a career perspective
251 days ago
Every Programmer should strive for reading these 5 books
577962 views
Why you should not become a Programmer or not learn Programming Language?
236328 views
See the Salaries if you are willing to get a Job in Programming Languages without a degree?
151746 views
Highest Paid Programming Languages With Highest Market Demand
136545 views
Have a look of some Top Programming Languages used in PubG
131100 views
Roadmap to reducing risk to sensitive data, giving you an inside look at the state of Data Security
- Total data: 54.58 petabytes
- Folders analyzed: 4,332,290,346
- Folders with global access: 953,616,561
- Files analyzed: 53,885,498,652
- Files with global access: 13,445,993,510
- Total number of user accounts: 12,754,608
- Average number of folders per TB: 128,782
- Average number of files per TB: 1,460,000
- Number of exposed, sensitive files per TB: 3,144
- 17% of all sensitive files were accessible to all employees
- 15% of companies found 1,000,000+ files open to every employee
- On average, every employee had access to 17 million files
- 38% of all users sampled have a password that never expires
- 11% of enabled users have expired passwords
- 58% of companies were found to have over 1,000 folders that had inconsistent permissions
- 27% of a company's users had removal recommendations and were likely to have more access to data than they require
- Over-exposed sensitive data
- Sensitive stale data
- Stale accounts
- Non-expiring passwords
- Financial services: 21% of sensitive files were exposed
- Manufacturing: 21% of sensitive files were exposed
- Healthcare, Pharma & Biotech: 15% of sensitive files were exposed
- Energy & Utilities: 14% of sensitive files were exposed
- Retail: 14% of sensitive files were exposed
- Government & Military: 12% of sensitive files were exposed
- Identify and fix global access groups that grant access to sensitive data
- Ensure only appropriate users retain access to sensitive, regulated data
- Routinely run a full audit of your servers, looking for any data containers (folders, mailboxes, SharePoint sites, etc.) with global access groups applied to their ACLs
- Replace global access groups with tightly managed security groups
- Start with the most sensitive data and test changes to ensure issues do not arise
- Apply additional "preventive controls"- like encryption- through digital rights management (DRM)
- Minimize the sensitive data you collect, who gets to see it and how long you keep it
- Identify stale data - especially sensitive information
- Create a predetermined data retention period
- Archive or delete stale data if no longer needed
- Hunt and eliminate stale accounts and non-expiring passwords
- IT must disable non-expiring passwords and set passwords for all users to expire at set intervals
- If an account requires a static password, it must be extremely long, complex and random
- Use enterprise-wide password managers and two-factor authentication, as well as monitoring and alerting on suspicious failed login attempts
- Make sure stale accounts are disabled and monitored to re-enable activity or delete the account
- Implement procedures to ensure that all user accounts are active, governed and monitored
- Understand what constitutes normal behavior on both user and service accounts so you can be more effective at spotting inactive users and behavioral abnormalities
- Boost your anomaly detection capabilities and response processes