2016 Security Trends: What's Next for Data Breaches?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Health Care Data 

Health care companies will continue to be the top target for a data breach.

According to various reports, including the recent Data Breach Index for 1H 2015 from Gemalto, health care holds the dubious distinction for having the highest number of data breach incidents compared to other industries. Ponemon's Cost of Data Breach Study report confirms that the cost per record stolen is higher in health care than any other industry. Health care data still commands a 10x premium over financial and other personal information. At the same time, most health care companies lack the ability to find a network attacker that has circumvented preventative security and is in the process of exploring an unfamiliar network, gaining additional points of control and getting closer to Protected Health Information (PHI) and Personal Identity Information (PII) records. Even data encryption, greater network segmentation and additional authentication controls are unlikely to impede network attackers, as they can steal valid credentials that give them access to critical data to carry out their work. These network attacks will continue to occur in 2016 and health care will likely continue to represent the top industry to be victimized by data breaches.

Over the past year, there have been a number of disturbing developments with regards to data breaches. Not only have data breaches become more frequent, but their impact has become greater — not just in the sheer volume of information or assets stolen, but in the very nature of what hackers are targeting. The extremely sensitive data lost in the White House and Office of Personnel Management breaches are prime examples. Unfortunately, given the successful breaches of high-value targets in 2015, we can be sure that 2016 will only get worse.

With this horrifying direction and the gravity of what's at stake, it would be a fair expectation that most enterprises should be seriously looking at how their security needs to change. Obviously, traditional security is of little value when it comes to stopping a data breach. Intruders can easily elude preventative security — generally by compromising a single user device or account — and furtively conduct their business inside a network for months before being discovered.

A big part of the problem is that security organizations are still focused on preventative security — looking for a silver bullet that will keep an attacker out of their networks in the first place. Despite a Gartner recommendation that organizations shift security efforts toward the detection of network intruders and the emergence of promising new behavioral analytic tools and security strategies, well under 1 percent of enterprises have the ability to find a post-intrusion network attacker. Cyber criminals continue to have the potential for unimpeded, long-term success.

So how will attacks change in 2016? In this slideshow, David Thompson, Sr. Director of Product Management, LightCyber, has identified data breach trends we can expect to see in 2016.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.