USEUROPEAFRICAASIA 中文雙語Fran?ais
Business
Home / Business / Technology

Enterprises prepare for insider threats to data

By WU YIYAO | China Daily | Updated: 2016-11-24 08:20

Insiders have become one of the largest threats to enterprises' critical digital and physical assets, according to research commissioned by EY, a consultancy services provider.

The study polled more than 665 senior executives in 17 countries and regions, including 40 professionals from China. More than 25 percent of respondents said they believe insider threats and illicit behaviors taking advantage of internet technologies are the fastest growing risk.

"About 70 percent of our services delivered to clients are focusing on illicit behavior taking advantage of internet technologies such as using loopholes in network systems and online payment schemes, particularly in fintech and online payment sectors," said Chen Zhi, an EY partner and expert in fraud investigation and dispute services.

More exposure amid increased connectivity is making it difficult to detect threats to critical assets, such as intellectual property, formulas, payment information, and clients' personal information, said Chen.

"It is not just an IT issue-it takes an enterprisewide approach including many human elements-to plan for, prevent, detect, respond to and recover from insider threats," said EY's research note on managing insider threats.

China's enterprises said they have increasingly invested in improving their organization's internet safety and internet security, including deploying more resources to build up their cybersecurity teams and use more third-party services, such as data monitoring, data recovery and user behavior pattern analysis.

On Nov 7, China's cybersecurity law was approved by the Standing Committee of the National People's Congress, China's top legislature. The law will come into effect on June 1, 2017.

"Having worked extensively with clients in APAC and China, we know the challenges they face managing data in legal proceedings and ensuring that privacy and state secrecy laws are respected. E-discovery solutions that allow clients to process data in the country and on-site at a company's premises in China are therefore essential," said Kate Chan, regional managing director in Kroll Ontrack's Asia Pacific practice, an end-to-end provider of electronic evidence services.

Even small-sized enterprises, such as startups, should bear in mind that computer forensics, e-discovery, and document review are important for protecting rights. They should start working with professionals, such as lawyers, at a very early stage of operations to ensure long-term growth and safety, said Chan.

Most Viewed in 24 Hours
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 日日噜噜噜夜夜爽爽狠狠| 狠狠色狠狠色综合伊人| 国产精品成年片在线观看| 中文字幕免费在线| 杨钰莹欲乱小说| 人妻丰满熟妇AV无码区免| 色爱无码av综合区| 国产精品一区二区在线观看| a级毛片高清免费视频| 无码人妻少妇久久中文字幕| 亚洲人成电影院在线观看| 男女性杂交内射女BBWXZ| 国产三级精品三级| 色五五月五月开| 在线视频免费国产成人| 中文国产日韩欧美视频| 日韩精品在线视频观看| 亚洲日本在线看片| 男男18gay| 国产60部真实乱| 91黑丝国产线观看免费| 国产美女被爆羞羞视频| 一个人看的免费高清视频www| 日本伊人色综合网| 亚洲sss视频| 残虐极限扩宫俱乐部小说| 冲田杏梨在线中文字幕全集| 蜜臀av性久久久久蜜臀aⅴ麻豆| 国产精品99久久久| 97国产在线视频| 女人张开大腿让男人桶| 中文字幕の友人北条麻妃| 日本理论片午夜论片| 亚洲av日韩综合一区二区三区| 欧美色视频日本| 伺候情侣主vk| 精品永久久福利一区二区| 国产亚洲精品91| 国产精品亚洲综合五月天| 国产精品成人观看视频国产奇米| 99精品在线播放|