Six Data Breach Predictions for 2015

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Data Breach Predictions for 2015-2 Next

Changing State of Retail Breaches

With the imminent adoption requirement for EMV "chip and PIN" technology in the United States in October 2015, the window may be closing for hackers to easily profit from point-of-sale attacks on brick-and-mortar retailers. Today, U.S.-based retailers face a perfect storm of having information that is an attractive target to attackers and the availability of malware capable of compromising payment systems being sold on the black market. Expect a continued influx of payment breaches in the near term before the new system is implemented late next year.

In the interim, larger retailers will continue to take steps to harden their systems to be less vulnerable to attacks. However, despite increased security efforts, attackers may look for new ways to compromise these companies given how profitable the payoff can be. IT security professionals should be wary of the potential for the new infrastructure to create a false sense of security for their colleagues and consumers.

With the end of the year fast approaching, now is an apt time to reflect back on 2014 and look ahead to what's to come next year. For the data breach industry, 2014 was an explosive year with nearly half of all organizations suffering at least one data breach – up 10 percent from the year prior. This has resulted in companies taking positive initial steps to prepare for a breach, but much remains to be done.

To help businesses prepare for what is on the horizon, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape.

For more guidance on how to prepare for a data breach, you can also download the Experian Data Breach Response Guide, available for free at: http://www.experian.com/data-breach/2014-2015-response-guide.html.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.