Security Lessons Learned from 2014: The Year of the Mega Breaches

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Security Lessons Learned from 2014: The Year of the Mega Breaches-7 Next

Difficulty Remediating Breaches

Organizations also admitted difficulty in both detecting and remediating data breaches. Forty-six percent of respondents indicated that their breaches were discovered accidentally, and 95 percent said the incidents weren't discovered for at least three months; 74 percent weren't discovered for at least a year. The lingering impact of breaches was also evident, as 70 percent of data breaches weren't resolved for at least a year.

A major lesson businesses continue to emphasize that they learned this past year is that any organization, regardless of size, is vulnerable to a data breach. Starting with the infamous Target breach in late 2013, which compromised millions of consumers, continuing to the Sony attack that saw personal information exposed, and now the massive breach at Anthem, well-known entities have endured financial and reputational damage due to breaches.

In a Ponemon Institute study, commissioned by sensitive-data-management-solution provider Identity Finder, called "2014: Year of the Mega Breaches;" 735 IT and IT security practitioners were polled to gauge how their organizations reacted — both attitudinally and through IT security investments — to the Target breach in 2014. The study also explored details about breaches that some respondents' businesses had experienced.

According to the study, organizations are more aware of data breaches, but many continue to invest in solutions that have failed to keep cyber criminals out — for example, JP Morgan Chase spent $250 million on security prior to its breach last year — and those organizations are failing to invest in areas that could empower them to shrink the amount of data that cyber criminals can steal in the first place. In this slideshow, Todd Feinman, CEO, Identity Finder, highlights findings from this study.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.