Six Data Breach Predictions for 2015

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Data Breach Predictions for 2015-7 Next

Rise in Third-Party Breaches via the Internet of Things

Technology advancements mean the Internet of Things (IoT) is changing how people interact with everyday items. According to Gartner, the IoT will grow to 26 billion units installed in 2020, representing an almost 30-fold increase from 0.9 billion in 2009. With more companies looking to leverage the IoT by gathering, storing and processing data from billions of objects and devices, there are more points of vulnerability for this information to be targeted by hackers. As a result, an increase is expected in cyber attack campaigns initiated by IoT-compromised devices and interconnected systems adopted by organizations, including everything from sensor networks and work meters to consumer devices such as routers and NAS storage.

As companies adopt more interconnected products and systems, the IoT could usher in the next wave of large third-party breaches. Security professionals at companies using IoT data must emphasize risk management and security with third-party vendors that provide or have access to the same information.

With the end of the year fast approaching, now is an apt time to reflect back on 2014 and look ahead to what's to come next year. For the data breach industry, 2014 was an explosive year with nearly half of all organizations suffering at least one data breach – up 10 percent from the year prior. This has resulted in companies taking positive initial steps to prepare for a breach, but much remains to be done.

To help businesses prepare for what is on the horizon, Experian Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions are based on experience helping more than 3,000 companies manage breaches of all types in 2014 and conversations with leaders across the security landscape.

For more guidance on how to prepare for a data breach, you can also download the Experian Data Breach Response Guide, available for free at: http://www.experian.com/data-breach/2014-2015-response-guide.html.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.