
{"id":2030,"date":"2012-09-05T00:00:00","date_gmt":"2012-09-05T00:00:00","guid":{"rendered":"http:\/\/otava.test\/the-latest-it-security-stats-are-you-at-risk\/"},"modified":"2025-11-07T06:40:50","modified_gmt":"2025-11-07T06:40:50","slug":"the-latest-it-security-stats-are-you-at-risk","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/","title":{"rendered":"The Latest IT Security Stats: Are You At Risk?"},"content":{"rendered":"<p>Symantec\u2019s now infamous 2011 Internet Security Threat Report is packed full of who, why, where and how when it comes to online attacks in the past year. Published in April 2012, the document highlights the latest trends in Internet security.<\/p>\n<figure id=\"attachment_7844\" aria-describedby=\"caption-attachment-7844\" style=\"width: 334px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7844\" title=\"Mobile Risks\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png\" alt=\"Mobile Risks\" width=\"334\" height=\"267\" \/><figcaption id=\"caption-attachment-7844\" class=\"wp-caption-text\">Mobile Risks<\/figcaption><\/figure>\n<p>One increasing risk, as many know, is mobile, due in part to increasing smartphone user growth &#8211; Gartner predicts sales to hit <strong>645 million by the end of 2012<\/strong>. This means an increase in mobile malware that can collect, send or track data (<strong>93.3% increase in mobile vulnerabilities since 2010<\/strong>). Mobile devices are also at risk for loss or theft; if personal or confidential company\/client data is stored locally on your device, this can result in a data breach.<\/p>\n<p>One way companies can safeguard a <strong>BYOD<\/strong> (Bring Your Own Device) environment includes creating a mobile security strategy, developing standardized user policies, and engaging in employee training.<\/p>\n<figure id=\"attachment_7847\" aria-describedby=\"caption-attachment-7847\" style=\"width: 276px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7847 \" title=\"Mitigate BYOD Risks\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mitigate-BYOD-Risks.png\" alt=\"Mitigate BYOD Risks\" width=\"276\" height=\"266\" \/><figcaption id=\"caption-attachment-7847\" class=\"wp-caption-text\">Mitigate BYOD Risks<\/figcaption><\/figure>\n<p>[If you\u2019re interested in learning more about crafting a<\/p>\n<p>secure and compliant BYOD environment,\u00a0don\u2019t miss our Fall into IT presentation, <em><strong>BYOD: From Concept to Reality<\/strong><\/em>, presented by Kirk Larson, VP and CIO of the Children\u2019s Hospital Central California.\u00a0<a href=\"https:\/\/www.onlinetech.com\/resources\/events\/seminars\/fall-into-it\">More details here<\/a>.<\/p>\n<p>Recommended Reading: <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/keep-ephi-on-secure-networks-not-mobile-devices-recommends-ocr\/\">Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR<\/a>].<\/p>\n<p>The report also revealed that half of the total targeted online attacks were directed at small-to-medium sized businesses with fewer than 2,500 employees. Seventeen percent were directed at companies with fewer than 250 employees. The report cites the possibility that smaller organizations may not invest as much time or budget into proper security, but they may still be in partnership with larger companies, and offer an open door to hackers.<\/p>\n<figure id=\"attachment_7858\" aria-describedby=\"caption-attachment-7858\" style=\"width: 339px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7858 \" title=\"Who's Being Targeted?\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Whos-Being-Targeted.png\" alt=\"Who's Being Targeted?\" width=\"339\" height=\"375\" \/><figcaption id=\"caption-attachment-7858\" class=\"wp-caption-text\">Who&#8217;s Being Targeted?<\/figcaption><\/figure>\n<p>Who, specifically within those organizations, is being targeted?<\/p>\n<p>Shared mailboxes (23 percent). are close behind the executive level employees (25 percent). Sales are third at 12 percent.<\/p>\n<p>The industries with the greatest number of total identities exposed included computer software, IT and healthcare sectors, accounting for 93 percent of total stolen identities in 2011. When it came to data breaches, healthcare blew all of the other industries out of the water at 43 percent. Next came government (14 percent) and third was education (13 percent).<\/p>\n<p>What can you do to protect your company from a potential data breach? While our PCI Compliant Hosting white paper is primarily directed at ecommerce and financial industries, it provides a comprehensive overview of the technology that can protect any web\/application and database servers, regardless of industry type. From Web Application Firewalls (WAFs) to Daily Log Review, this paper explains each in detail. <a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">Download our PCI Compliant Hosting white paper<\/a> today.<\/p>\n<p>For healthcare organizations, download our <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a> for HIPAA\/HITECH requirements and recommendations.<\/p>\n<p>Reference:<br \/>\n<a href=\"https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-istr_main_report_2011_21239364.en-us.pdf\">Symantec\u2019s 2011 Internet Security Threat Report<\/a> (PDF)<strong id=\"internal-source-marker_0.15741559257730842\"><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symantec\u2019s now infamous 2011 Internet Security Threat Report is packed full of who, why, where and how when it comes to online attacks in the past year. Published in April 2012, the document highlights the latest trends in Internet security. One increasing risk, as many know, is mobile, due in part to increasing smartphone user growth &#8211; Gartner predicts sales to hit 645 million by the end of 2012. This means an increase in mobile malware that can collect, send or track data (93.3% increase in mobile vulnerabilities since 2010). Mobile devices are also at risk for loss or theft; if personal or confidential company\/client data is stored locally on your device, this can result in a data breach. One way companies can safeguard a BYOD (Bring Your Own Device) environment includes creating a mobile security strategy, developing standardized user policies, and engaging in employee training. [If you\u2019re interested in learning more about crafting a secure and compliant BYOD environment,\u00a0don\u2019t miss our Fall into IT presentation, BYOD: From Concept to Reality, presented by Kirk Larson, VP and CIO of the Children\u2019s Hospital Central California.\u00a0More details here. Recommended Reading: Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR]. The report&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2030","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Latest IT Security Stats: Are You At Risk? | OTAVA<\/title>\n<meta name=\"description\" content=\"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Latest IT Security Stats: Are You At Risk?\" \/>\n<meta property=\"og:description\" content=\"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T06:40:50+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"The Latest IT Security Stats: Are You At Risk?\",\"datePublished\":\"2012-09-05T00:00:00+00:00\",\"dateModified\":\"2025-11-07T06:40:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\"},\"wordCount\":479,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png\",\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\",\"url\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\",\"name\":\"The Latest IT Security Stats: Are You At Risk? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png\",\"datePublished\":\"2012-09-05T00:00:00+00:00\",\"dateModified\":\"2025-11-07T06:40:50+00:00\",\"description\":\"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Latest IT Security Stats: Are You At Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Latest IT Security Stats: Are You At Risk? | OTAVA","description":"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/","og_locale":"en_US","og_type":"article","og_title":"The Latest IT Security Stats: Are You At Risk?","og_description":"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.","og_url":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/","og_site_name":"OTAVA","article_published_time":"2012-09-05T00:00:00+00:00","article_modified_time":"2025-11-07T06:40:50+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"The Latest IT Security Stats: Are You At Risk?","datePublished":"2012-09-05T00:00:00+00:00","dateModified":"2025-11-07T06:40:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/"},"wordCount":479,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png","articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/","url":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/","name":"The Latest IT Security Stats: Are You At Risk? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png","datePublished":"2012-09-05T00:00:00+00:00","dateModified":"2025-11-07T06:40:50+00:00","description":"See the latest IT-security statistics and assess whether your organization is at risk \u2014 then take action to close the gaps.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Risks.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/the-latest-it-security-stats-are-you-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"The Latest IT Security Stats: Are You At Risk?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2030"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2030\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2030"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}