Six Data Breach Predictions for 2015

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Data Breach Predictions for 2015-2 Next

Changing State of Retail Breaches

With the imminent adoption requirement for EMV "chip and PIN" technology in the United States in October 2015, the window may be closing for hackers to easily profit from point-of-sale attacks on brick-and-mortar retailers. Today, U.S.-based retailers face a perfect storm of having information that is an attractive target to attackers and the availability of malware capable of compromising payment systems being sold on the black market. Expect a continued influx of payment breaches in the near term before the new system is implemented late next year.

In the interim, larger retailers will continue to take steps to harden their systems to be less vulnerable to attacks. However, despite increased security efforts, attackers may look for new ways to compromise these companies given how profitable the payoff can be. IT security professionals should be wary of the potential for the new infrastructure to create a false sense of security for their colleagues and consumers.

With the end of the year fast approaching, now is an apt time to reflect back on 2014 and look ahead to what's to come next year. For the data breach industry, 2014 was an explosive year with nearly half of all organizations suffering at least one data breach – up 10 percent from the year prior. This has resulted in companies taking positive initial steps to prepare for a breach, but much remains to be done.

To help businesses prepare for what is on the horizon, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape.

For more guidance on how to prepare for a data breach, you can also download the Experian Data Breach Response Guide, available for free at:


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.