Follow the Data – Debunking the Security Myths

For those wanting to gain more insight into probability studies or forward researching at what the hacking the community is going after, this is a great article to read. 
 Trend Micro ariticle – Follow the Data
 
As discussed, Mobile device security is a huge plus in thwarting 41% of overall breaches, while malware and hacking breaches actually only make up 25%. Several myths discussed are based on what is of actual value, what data is in surplus and what is in high demand.
 
Some interesting graphs are also shown that just re-emphasize the need to protect credentials and give value to how important protecting network and domain administrator credentials truly are. 
 
It all truly leads back to three important questions.
 
1. Where is my critical data and who has access to it?
2. Is this data or system at risk or possibly vulnerable?
3. How much will it cost to safeguard this data or system?