Cybercriminal gangs motivated by money, espionage or hacktivism have grown their operations from a hit-or-miss shotgun approach to tightly targeted hits that pool the skill sets of professional villains. Attacks are precise and calculated. When successful, they yield extraordinary ROI for hackers and often cause crippling damage and costs to businesses, government agencies and consumers.

This IDC Spotlight stratifies threat actors into three categories and summarizes the ways in which criminal groups infiltrate enterprises to drain corporate accounts, steal IP, encrypt data and extort businesses for ransom.

“The drumbeat of high-profile data breaches over the past decade has repeatedly highlighted the failure of organizations to effectively apply basic security best practices,” said Robert Westervelt, research manager in IDC’s Security Products group. In this article he offers three best practices to reduce the risk of data theft.

IDC Tech Spotlight Dangerous Threats Require Backup for Data Protection and Recovery

ANALYST WHITE PAPER

About Code42
Code42 is a global enterprise SaaS provider of endpoint data protection and security to more than 37,000 organizations, including the most recognized brands in business and education. Our highly secure cloud solutions enable IT and security teams to limit risk, meet data privacy regulations and recover from data loss, no matter the cause. For more information, visit www.code42.com.