Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The biggest data breaches of 2016 could and should have been prevented

by The Gurus
December 13, 2016
in Editor's News
data breach
Share on FacebookShare on Twitter

Many, if not most, of the data breaches throughout 2016 could have been avoided with the correct people, process, technology and most importantly culture in place. This is the opinion of Phil Bindley, CTO of Cloud Services Provider (CSP) The Bunker, who argues that the biggest security threat for organisations in 2017 will be a complacency towards good security hygiene. 

According to the 2016 Data Protection and Breach Readiness Guide, 93 per cent of breaches in 2015 could have been prevented. Despite this learning, breaches continued to take place throughout 2016, including some of the largest scale hacks in history. These ranged from the Panama Papers data leak, which saw Mossack Fonseca lose 11.5 million files after hackers breached its systems, to – more recently – the breach of Daily Motion whereby 85 million user credentials were compromised.

For Phil Bindley, in order to significantly reduce the occurrence of data breaches and to prevent this trend from continuing as we move into 2017, organisations need to start to look at everything through a lens of data security.

He explains: “The sheer number of data breaches throughout 2016 has led many to believe that falling victim to a hack is no longer a matter of ‘if’ but ‘when’, as the adage goes. However, many of these incidents could have been prevented. The problem here is that, all too often, the responsibility for security starts and ends with the IT department, meaning that these incidents continue to occur. Either senior management staff are ignorant to the importance of good security hygiene, or information security professionals are failing to communicate the message.

“Data is the most valuable asset of an organisation, from the Intellectual Property (IP) on which their businesses are built, to the Personally Identifiable Information (PII) that they hold on behalf of their customers. Therefore, everyone in an organisations must be thinking about what they do on a day-to-day basis to protect this. It simply doesn’t make good business sense to do otherwise, especially considering that the deadline for compliance with the General Data Protection Regulation (GDPR) is approaching, where companies will be subject to large fines for failing to keep personal data appropriately secure.

“While breaches will continue to take place as hackers become increasingly advanced in their tactics, the severity and frequency of these can be dramatically reduced. Organisations must incorporate a culture of information security in all aspects of a business. It’s not about building a bigger firewall, it’s about a complete shift in attitude towards cybersecurity. This new culture has to come from both the top-down, and from the ground-up; it’s a form of behaviour that flourishes when people believe it is the right way of doing things and not simply a box-ticking exercise.  

“This ethos extends to every facet of an organisation, including the supply chain. To this end, companies need to oversee all aspects of their outsourcing arrangements to ensure they provision third-party services from a provider who offers the utmost cyber resilience and transparency. After all, information security empowers businesses to be more competitive, manage risk, protect their brand and allow innovation in a controlled manner, therefore there’s a significant benefit to be had from working with a Cloud Services Provider (CSP) who values security,” concludes Bindley.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

'CEO cyber-naivety' leaves global organisations exposed to major cyber attacks

Next Post

In 2017, less malware and more advanced attacks

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information