sponsored by ComputerWeekly.com
Posted:  31 Aug 2012
Published:  05 Jul 2012
Format:  PDF
Length:  32  Page(s)
Type:  Research Content
Language:  English
ABSTRACT:

 

Publish and be Damned:  What does your online corporate profile reveal?

 

With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers.

 

And so they should. According to our research, more than three-quarters of the Forbes 2000 companies leak potentially dangerous data.

 

The sources of this information are varied and widespread. Some are within the direct control of the corporation (websites, documents and web servers) and – with effort – can be directly addressed.

 

Other channels such as popular search engines and forums, are outside of the usual enterprise security curtain and pose a much more complex challenge.

 

Many of the sectors that normally display exceptionally strong cyber security controls seem to be at the highest risk, namely banks, financial services and telecoms companies.

 

Click on the button below  to download the full report

 

 

KPMG is a leading provider of professional services in Ireland. We work with clients in all sectors of Irish business, providing a range of Audit, Tax and Advisory services.






BROWSE RELATED RESOURCES
Cybersecurity | Cyberterrorism | Database Management | Database Security | Security | Security Architectures | Security Best Practices | Security Event Management | Security Industry | Security Management | Security Policies | Security Standards | Security Systems | Security Threats | Web Server Software | Web Services | Web Services Management

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement