This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ime, business users and even
market regulators are curiously tolerant of poor data quality.
Another paradox is that there are often covert projects
delivered as part of larger enterprise data integration
business initiatives that have a tendency to overrun or fail.
Part of the reason for this not being handled at an earlier
stage is that data quality issues often remain opaque until
someone attempts to use the data. The lesson is simple:
you can run from bad data, but you can’t hide from it forever.
Eventually bad data will become transparent to IT systems
and manifest itself in bad business decisions. S TRAIGHTTALK I T 7 8 S TRAIGHTTALK I T Hype and actuality in
S ecurity breaches are expensive and common. Most are caused by the
same old problems that we have been battling for years. Many leading
organizations in the field produce regular threat or vulnerability
reports. We have “surveyed the surveys” and believe their different
constituencies or methodologies can explain the variance in their messages.
The underlying trends are clear. GRAHAM TITTERINGTON The threat level is rising
The growing malware threat Whatever view you take of the threat to
information security, the environment
is getting more hostile. Both anecdotal
and quantitative evidence suggests that
the rate of increase is also growing. Increase in 2009
350% Urban myths are not a basis for
security policy 300%
250% Don’t be fooled by people who say that
IT security is now sorted and that a few
basic products from markets that have
become commoditized will take care of
things. Headline results from the study
led to the following conclusions: 200%
malware RSA Security
attacks Cisco –
incident total Sophos –
passworddistributed stealing Trojans
networking Organization and type of incident Verizon
breached ■ Keep up your defenses against
View Full Document
This document was uploaded on 12/31/2013.
- Fall '13