Outdated cybersecurity solutions with data backhaul and hardware upgrades cost organizations millions of dollars each year. There are other alternatives to backhauling data that keep your network secure and your costs down. Here are three misconceptions of designing your cybersecurity solution.
Many government regulations address mobile device use, directly or indirectly, whether the device is government-issued or personally owned. For example, the Health Insurance Portability and Accountability Act (HIPAA) Security Rule is designed to protect an individual's electronic protected health information (ePHI) that is "created, received, used, or maintained by a covered entity." Because mobile devices can store data on the device, any ePHI exchanged when using the device is at risk of unauthorized disclosure. Using a mobile device connected to a public or otherwise unsecure Wi-Fi connection also poses a risk to ePHI because those connections are easily sniffed.
Payments between banks are vulnerable. Interbank payments are payments that banks and financial institutions make between each other nationally and internationally, using special banking payment systems. One example of such a system is CHIPS, the Clearing House Interbank Payments System in the United States. There are other systems, which operate within and between nations.
Three market sectors could suffer millions to billions in losses. As of early October 2016, the ID Theft Center reports that hackers breached 601 organizations in the government, healthcare, and finance sectors as well as the business category. These attacks exposed more than 28 million records. Based on estimates of $200K to $4 million in losses from a data breach, the total cost of these breaches could range from $120 million to $2.4 billion.
When it comes to cybersecurity, many school districts are woefully behind the times, often relying on web content filters older than their students to protect against cyber attacks. The thing is, cyber threats have evolved rapidly and the old tools just don’t cut it anymore.
It wasn’t that long ago —around five years — that major industries, including higher education, had just started discussing cloud computing. Corporate CIOs pledged to never put mission critical systems out on the cloud, but that thinking has shifted today.
Just as Target CEO Gregg Steinhafel stepped down after the retail giant’s credit card security stumble stymied 40 million customers, OPM CIO Donna Seymour relinquished her position in favor of retirement after the federal agency failed to protect personal information belonging to 21.5 million people.
IT giant Cisco figured that, as of 2014, the world would be short 1 million cybersecurity pros to fend off the constant threat of online attackers, who seem to grow in number and sophistication by the minute. Meanwhile, as many as 1.2 billion people were estimated by Spil Games to be video-game players by the end of 2013.
As the United States approaches the Presidential election this November, there will be more security threats, including an increase in misinformation perpetrated across social media, targeted attacks against voter information and election systems, and an overall lack of active engagement or understanding of cybersecurity risks by executive leaders.
You wouldn’t think it, but student data in school campuses has become a favorite target for hackers. School districts routinely collect an assortment of data on students, including attendance and medical records, and store it on their servers.