One of the reasons I post the Symantec Intelligence Report is that it contains information that individuals and businesses need to know about securing their IT environments. This month is no different. The topic is data breaches and rather than look at the data breach trends (the nature of the breaches) the report focuses on the types of data stolen during a breach. And as it turns out the most commonly stolen information is often much more personal that people might first expect.

The report also examines the inevitable increase in holiday-related spam, both the frequency and size of spam messages.
Take a look at the report here [Warning: PDF] for more details.
Related
This entry was posted on December 15, 2012 at 10:37 am and is filed under Commentary with tags Symantec. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Symantec Details What Types Of Information Is Stolen During A Data Breach
One of the reasons I post the Symantec Intelligence Report is that it contains information that individuals and businesses need to know about securing their IT environments. This month is no different. The topic is data breaches and rather than look at the data breach trends (the nature of the breaches) the report focuses on the types of data stolen during a breach. And as it turns out the most commonly stolen information is often much more personal that people might first expect.
The report also examines the inevitable increase in holiday-related spam, both the frequency and size of spam messages.
Take a look at the report here [Warning: PDF] for more details.
Share this:
Like this:
Related
This entry was posted on December 15, 2012 at 10:37 am and is filed under Commentary with tags Symantec. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.