On Guard or Under the Radar: How Threats Vary by Industry

IT Connection Blog by Amy Larsen DeCarlo

Summary Bullets:

  • Not surprisingly, organizations often apply similar security protections and practices to those employed by their industry peers to safeguard what are often very comparable assets, leaving them equally vulnerable or well-protected depending upon the effectiveness of their controls.
  • While cyber attackers target certain industry-specific, high-value assets such as a manufacturing company’s intellectual property (IP), many of the breaches involve the theft of less valuable resources that are more often left exposed to risk.

Just as enterprises in every industry tend to share some analogous traits in how they do or do not effectively leverage IT to advance their particular business agendas, organizations within the same vertical tend to use data security strategies similar to those their counterparts use to safeguard equivalent assets.  Thus, it is not all that surprising to see some vertically specific security breach trends that highlight gaps in industry-wide security practices. Read more of this post at http://bit.ly/YITJrZ 

Media Contact:

Amee Singh
Sr. Director, Marketing Communications
pr@currentanalysis.com 

About IT Connection

IT Connection is the premier source of unbiased analysis and assessments of IT equipment and telecom services.  IT Connection provides easy-to-access, cost-effective, non-vendor-sponsored research to enterprise IT professionals.  The assessments on IT Connection allow you to quickly, easily, and efficiently assess suppliers, access side-by-side product comparisons, determine the best technology solution to fit your needs, and receive real-time updates and analysis on breaking market-changing events.  To join our community and interact with your peers and our analysts, visit us at www.currentanalysis.com/ITC.

About Current Analysis

Current Analysis (http://www.currentanalysis.com) has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business. Current Analysis is the only provider of continuous, in-depth tactical competitive intelligence, analysis, and advice. For more than 15 years, sales teams, product managers, marketing professionals, and executives have relied on Current Analysis as a trusted partner to improve their ability to anticipate and quickly take action on market opportunities and competitive threats. The company serves more than 35,000 professionals at over 1,600 global enterprises.

Tags:

About Us

Current Analysis has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business since 1997. As the only provider of real-time, in-depth tactical competitive intelligence, analysis, sales teams, product managers, marketing professionals, and executives rely on Current Analysis to anticipate and quickly take action on market opportunities and competitive threats.

Documents & Links

Quick facts

Not surprisingly, organizations often apply similar security protections and practices to those employed by their industry peers to safeguard what are often very comparable assets, leaving them equally vulnerable or well-protected depending upon the effectiveness of their controls.
Tweet this
While cyber attackers target certain industry-specific, high-value assets such as a manufacturing company’s intellectual property (IP), many of the breaches involve the theft of less valuable resources that are more often left exposed to risk.
Tweet this