Six Data Breach Predictions for 2015

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Data Breach Predictions for 2015-2 Next

Changing State of Retail Breaches

With the imminent adoption requirement for EMV "chip and PIN" technology in the United States in October 2015, the window may be closing for hackers to easily profit from point-of-sale attacks on brick-and-mortar retailers. Today, U.S.-based retailers face a perfect storm of having information that is an attractive target to attackers and the availability of malware capable of compromising payment systems being sold on the black market. Expect a continued influx of payment breaches in the near term before the new system is implemented late next year.

In the interim, larger retailers will continue to take steps to harden their systems to be less vulnerable to attacks. However, despite increased security efforts, attackers may look for new ways to compromise these companies given how profitable the payoff can be. IT security professionals should be wary of the potential for the new infrastructure to create a false sense of security for their colleagues and consumers.

With the end of the year fast approaching, now is an apt time to reflect back on 2014 and look ahead to what's to come next year. For the data breach industry, 2014 was an explosive year with nearly half of all organizations suffering at least one data breach – up 10 percent from the year prior. This has resulted in companies taking positive initial steps to prepare for a breach, but much remains to be done.

To help businesses prepare for what is on the horizon, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape.

For more guidance on how to prepare for a data breach, you can also download the Experian Data Breach Response Guide, available for free at: http://www.experian.com/data-breach/2014-2015-response-guide.html.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.