In its 2012 Data Breach Investigations Report, Verizon studied 855 data compromise incidents that occurred in 2011. Out of the 855 incidents, 81% leveraged hacking, 69% included malware, and an impressive 61% of all breaches featured a combination of hacking techniques and malware. Find the full Verizon report here http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf. Every IT security professional knows that the battle to protect IT resources and data is fully engaged. But just how aware is your company of these potential attacks? Your vulnerability management strategy begins with a comprehensive measurement of security risk. This is just the first step in protecting your assests. Check out the "Strategic Value of Measuring Real Risk" white paper to see what your company should really be concerned about: http://information.rapid7.com/Whitepapers_NNCSecurityRiskIntelligence.html?LS=1011112