On Guard or Under the Radar: How Threats Vary by Industry

Amy Larsen DeCarlo
Amy Larsen DeCarlo

Summary Bullets:

  • Not surprisingly, organizations often apply similar security protections and practices to those employed by their industry peers to safeguard what are often very comparable assets, leaving them equally vulnerable or well-protected depending upon the effectiveness of their controls.
  • While cyber attackers target certain industry-specific, high-value assets such as a manufacturing company’s intellectual property (IP), many of the breaches involve the theft of less valuable resources that are more often left exposed to risk.

Just as enterprises in every industry tend to share some analogous traits in how they do or do not effectively leverage IT to advance their particular business agendas, organizations within the same vertical tend to use data security strategies similar to those their counterparts use to safeguard equivalent assets.  Thus, it is not all that surprising to see some vertically specific security breach trends that highlight gaps in industry-wide security practices. Continue reading “On Guard or Under the Radar: How Threats Vary by Industry”