...
Full Bio
Today's Technology-Data Science
332 days ago
How to build effective machine learning models?
332 days ago
Why Robotic Process Automation Is Good For Your Business?
332 days ago
IoT-Advantages, Disadvantages, and Future
333 days ago
Look Artificial Intelligence from a career perspective
333 days ago
Every Programmer should strive for reading these 5 books
581559 views
Why you should not become a Programmer or not learn Programming Language?
242337 views
See the Salaries if you are willing to get a Job in Programming Languages without a degree?
152796 views
Have a look of some Top Programming Languages used in PubG
150435 views
Highest Paid Programming Languages With Highest Market Demand
138021 views
Roadmap to reducing risk to sensitive data, giving you an inside look at the state of Data Security
- Total data: 54.58 petabytes
- Folders analyzed: 4,332,290,346
- Folders with global access: 953,616,561
- Files analyzed: 53,885,498,652
- Files with global access: 13,445,993,510
- Total number of user accounts: 12,754,608
- Average number of folders per TB: 128,782
- Average number of files per TB: 1,460,000
- Number of exposed, sensitive files per TB: 3,144
- 17% of all sensitive files were accessible to all employees
- 15% of companies found 1,000,000+ files open to every employee
- On average, every employee had access to 17 million files
- 38% of all users sampled have a password that never expires
- 11% of enabled users have expired passwords
- 58% of companies were found to have over 1,000 folders that had inconsistent permissions
- 27% of a company's users had removal recommendations and were likely to have more access to data than they require
- Over-exposed sensitive data
- Sensitive stale data
- Stale accounts
- Non-expiring passwords
- Financial services: 21% of sensitive files were exposed
- Manufacturing: 21% of sensitive files were exposed
- Healthcare, Pharma & Biotech: 15% of sensitive files were exposed
- Energy & Utilities: 14% of sensitive files were exposed
- Retail: 14% of sensitive files were exposed
- Government & Military: 12% of sensitive files were exposed
- Identify and fix global access groups that grant access to sensitive data
- Ensure only appropriate users retain access to sensitive, regulated data
- Routinely run a full audit of your servers, looking for any data containers (folders, mailboxes, SharePoint sites, etc.) with global access groups applied to their ACLs
- Replace global access groups with tightly managed security groups
- Start with the most sensitive data and test changes to ensure issues do not arise
- Apply additional "preventive controls"- like encryption- through digital rights management (DRM)
- Minimize the sensitive data you collect, who gets to see it and how long you keep it
- Identify stale data - especially sensitive information
- Create a predetermined data retention period
- Archive or delete stale data if no longer needed
- Hunt and eliminate stale accounts and non-expiring passwords
- IT must disable non-expiring passwords and set passwords for all users to expire at set intervals
- If an account requires a static password, it must be extremely long, complex and random
- Use enterprise-wide password managers and two-factor authentication, as well as monitoring and alerting on suspicious failed login attempts
- Make sure stale accounts are disabled and monitored to re-enable activity or delete the account
- Implement procedures to ensure that all user accounts are active, governed and monitored
- Understand what constitutes normal behavior on both user and service accounts so you can be more effective at spotting inactive users and behavioral abnormalities
- Boost your anomaly detection capabilities and response processes