Information is wonderful, so wonderful that hackers want it. They want Personal Data, Corporate Espionage Data, Health Data, and so much more. The question is how much is your data worth to them?

The second question is how much is your data worth to you. Another way of putting this is, how much effort and money are you willing to put into protecting it.

If you visit the website www.Hackmageddon.com you can find information on so many recent attacks.

Verizon produces a Breach Report every year with statistics on Breaches for that year. In 2014, nine main areas were considered for Cyber and Attacks to get Information.

  • Card Skimmers
  • Crime-ware
  • Cyber Espionage
  • Cyber Webinage
  • DOS Attacks
  • Insider Malware
  • Miscellaneous errors
  • Physical theft or loss
  • POS Intrusion
  • Web/Application Attack

There is a convergence of Cyber Security, Business Continuity and Disaster Recovery. They have to be considered in tandem. New trends in business, include Globalization, Risk 360 degree views and protection, the complexity of the information and processes and connectivity with so many business partners and vendors.

Governance, Compliance, Risk Management, Cyber Security, Physical Security, Business Continuity and Disaster Recovery must start to work closer together in order to protect organizations assets in this new world.

Some of the necessary steps are to align policies, develop a common glossary of terms, joint education, and links in planning between the different disciplines, along with joint testing, and closing gaps.

Ensure that the plans are not generic, that the information is not to complicated to follow in a situation, and that resiliency starts on the operational levels. In other words, have a plan to plan. Validate any underlying assumptions and empower response teams to respond under the direction of a leader.

This is a big undertaking. So I ask again, how much effort and money are you will will to expend to protect your data?