- US Elections is a large/public event drawing attention (both media and for downstream technology decision) so preponderance of social and online media threat vectors equates toe. translation of related data leakage activities (and intellectual advantages).
- Payment security always plays a role and with chip/pin and online targets, mobile wallets and bleeding edge payment landscape are sure to be sources for theft and fraud. So, organization should be aware of exposures and everyone/consumers should be attuned to cyber tactics and know precautions.
- .doman names offers organization to benefit from customized websites and perhaps opportunities to direct/filter ISP traffic, however, with any action/benefits comes reaction or threat/exposure. So, adoption may come at a price, even if it’s just re-education or training behaviors.
- Insurance – we know is a tricky game in terms of what qualifies or disqualifies you and your payouts. So, expect requirements leading to payment for breaches to be stringent and insurers to be defensive about downstream liability and perhaps variations / options resulting for type of cyber incidents.
- Data theft prevention because your data is worth money. $1.5 per record to $20-40 range for bulk data and so value depend on who/what/where e.g. personal (credit) information of a 850 credit score is worth more than person with 600
- Aging Internet infrastructure resulting from technology changes/shifts and cost of conversion/upgrades or even expense of maintenance (hardware/software and labor) are high
- Complexity in technology transverses into exposures and when speed of deployment is not meeting business needs, image the speed in which monitoring or mitigating efforts are implementation, not i.e. little to none. Healthcare field penetration of technology will reach 40% by 2020 and that’s just with current expected growth or adoption.
- Privacy is in a state of evolution, whereby personal information and business data are intermingling in the devices uses but also behavior and overall cultural normals.
Article source: Forcepoint.com
No comments:
Post a Comment