by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2015
CYBERSECURITY CDW•G can help you fortify your defenses and keep your organization safe. Learn more at CDWG.com/security THE THREAT LANDSCAPE IS EVOLVING Is your cybersecurity protection keeping up? Internal and external cyberthreats are getting more and more sophisticated, and so should your cybersecurity defense. Are your agencies’ technologies, processes and practices ready to meet the challenge? Take a look at the cyber landscape and see if they’re up to the task. Sources: 1 symantec.com, “Internet Security Threat Report,” 2015 2Symantec Corporation, 2014 Internet Security Report, April 2014 3Gao.gov, “Federal Agencies Need to Enhance Responses to Data Breaches,” April 2014 4 cuna.org, “Assess Internal Threats to Your Network,” October 3, 2014 5 cfo.com, “Calculating the Colossal Cost of a Data Breach,” March 24, 2015 6Ponemon Research Report, The Risk of an Uncertain Security Strategy, November 2013 INDUSTRY TRENDS of security breaches go undiscovered for months. 6 66% THREATS ARE EVERYWHERE... 25,556 The number of data breach events in the federal government in 2013 that involved personally identifiable information, up from 10,481 in 2009. 3 36% of breaches were a result of inadvertent misuse of data by employees. 4 EVEN IN YOUR OWN BACKYARD 1 in every 392 emails contains a phishing attempt. 2 IT’S A CYBER JUNGLE OUT THERE BEWARE OF INSIDER THREATS 1 million Nearly one million new threats are released each day. 1 E The cost of a data breach averages $ 200 PER RECORD5 3 THE HIGH PRICE OF CYBERCRIME
August 30, 2015
September 30, 2015