Fifty-six percent of organizations experienced a data breach involving more than 1,000 records over the past two years, and of those, 37 percent occurred two to three times and 39 percent were global in scope, according to Experian.
A small subset of professional criminal actors is responsible for the bulk of cybercrime-related damage, employing tools and techniques as sophisticated, targeted and insidious as most nation-state actors, says the State of Cybercrime Report 2018.
As the Internet of Things (IoT) grows and cyberthreats become more sophisticated and prevalent, it’s more important than ever for security companies to understand the cybersecurity landscape and have strong cybersecurity postures. The security industry is recognizing the urgency of this issue, too – in the Security Industry Association’s (SIA’s) research to forecast the 2019 Security Megatrends, cybersecurity was identified as the standout trend shaping the security industry.
The 2018 State of Cybersecurity in Small and Medium Size Businesses study, conducted by the Ponemon Institute, sponsored by Keeper Security, revealed that small businesses increasingly face the same cybersecurity risks as larger companies, but only 28 percent rate their ability to mitigate threats, vulnerabilities and attacks as “highly effective.”
The frequency with which Americans worry about becoming the victim of a variety of different crimes is similar to last year, as they remain much more likely to fear being victimized by cybercrimes than traditional crimes.
Experts from The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, developed a list of the biggest cyber threats to watch out for in 2019.
Data security isn’t just a software issue. It’s far more physical than you think. While the discussions around cybersecurity awareness are primarily centered around workforce awareness, firewalls, passwords and mysterious black boxes, it’s important to note that a staggering amount of security breaches don’t involve logins, passwords or code at all. They involve people, hardware and a deafening lack of preparedness. In the age of all things cyber, are we dropping the ball when it comes to the physical threat?