Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Need more ammo to convince the C-suite that investing in cybersecurity is a good idea? A new report from Gemalto may do the trick, showing how the severity of breaches has increased in the past year alone.
According to Gemalto's 2018 Breach Level Index, 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, representing a 133 percent increase over the first half of 2017. In addition, 42.7 billion records were potentially exposed to a breach in the first half of 2018, up from 17.0 billion over the first half of 2017.
Interestingly, this increase occurred even though the total number of disclosed breach incidents decreased, from 1,162 in 2017 to 945 in 2018. This was largely due to a few large breaches exposing more than 100 million people, including those at Facebook, Exactis, Under Armour, and the Indian government's Aadhaar service.
In the report, Gemalto noted that new regulations such as the EU's General Data Protection Regulation (GDPR), New York's financial cybersecurity requirements, and Australia's Notifiable Data Breach scheme, could lead to increased reporting of breaches that may not have been previously disclosed.
“The rationale behind passing these standards is to help organizations better protect customers' privacy and security by design,” the report said. “But the regulations aren't without their drawbacks for businesses. Not only do they impose additional costs in terms of compliance; they also lead to an increase in the number of reported breaches.”
When looking at how these breaches occurred, malicious outsiders were the main source, comprising 56% of all breach incidents and 80% of all breached records. Accidental loss, which was the leading source of breach incidents during the first half of 2017, fell to just 34% of all breach incidents during the first half of 2018.
And when breaking down breaches by type of intrusion, identity theft was the frontrunner at 65% of all breach incidents and 87% of all breach records. Identity theft was followed by account access and financial access, at 17% and 13% of all breach incidents, respectively.
In the end, the report says that it will be key for organizations is to not only spend on cybersecurity, but spend wisely. Spending on technologies that simply monitor and protect an organization's perimeter will likely not have the effectiveness that they once had.
“Since the traditional perimeter of the enterprise has been blown up by the cloud, the new perimeter is the data itself and the users accessing that data,” the report said. “Mindsets need to change to adapt to this reality, and IT professionals need to accept that breaches will occur and attach security directly to the data itself and the users.”
*****
Zach Warren is the Editor-in-Chief of Legaltech News, an ALM sibling of Cybersecurity Law & Strategy. He can be reached at [email protected].
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.