Thought Leadership Program

Bring your insight and experience into the forefront of a growing technology community. Generate interest and have your articles viewed and shared by thousands of readers...

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology

In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach. Companies in 2017 that identity and classify data before they begin implementing DLP solutions will see a dramatic increase in the effectiveness of their data protection programs.

In 2017, attacks that seek to access a company’s sensitive data will increase. Some of the attacks will be conducted by activists looking to damage their targets’ integrity and reputation – similar to the intent behind the Sony breach. Other attacks will be for financial gain, predominantly tied to ransomware. Hiding behind the anonymity of bitcoin and other cryptocurrencies, ransomware continues to be a crime where the culprits can remain anonymous and difficult or even impossible to capture. Cybercriminals will continue to upload stolen data publicly to make investigations and containment trickier.

The likelihood of a data breach is higher than ever and organizations must get serious about the sensitive data sprawl that is occurring across their networks. In the case of the Sony breach, one of the biggest and most newsworthy breaches since 2014, the majority of the damage was done from sensitive data that was stored unprotected on their network. Companies need to develop enterprise-wide data security programs to address vulnerabilities.

Data sprawl continues to be a major threat to enterprises and governments alike. In the majority of recent attacks – the Home Depot breach, the SWIFT network breach, the DNC breach – the common denominator is the unaccounted-for sensitive data. Unknown or misplaced sensitive data that is stolen is the most valuable to the cyber thieves and the most devastating to companies. Enterprises and government organizations must take action to ensure they eliminate sensitive data sprawl across their organizations. This is the very first and most critical step in protecting themselves, their employees and their customers from the major risk of a data breach.

We also see Internet of Things (IoT) devices as a weak link in the security chain. The vast majority of IoT device manufacturers are not be able to address security threats, as we saw in the DDoS Dyn attack. Early IoT security failures will push the industry toward authentication standards but these standards will not be implemented before 2017 comes to a close. Operational technology needs to be aggressive with their cybersecurity approach – by hiring experts and assigning the businesses responsibility of cybersecurity to individuals.

###

By Dr. Jo Webber, Spirion, CEO

Dr. Webber is an experienced technologist and software company CEO having led three previous companies including Energy Solutions International, an Inverness Graham Portfolio company. She has served on 12 boards and has substantial M&A and international experience.

She has a PhD in Quantum Physics and has authored four patents. She is a Fellow of the Royal Society of Chemistry.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Digital Twin And The End Of The Dreaded Product Recall

By CloudTweaks

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

By Sarah Green

Battling With Bandwidth – Average Cost of DDoS Attack Was $40,000 An Hour

By Jennifer Klostermann

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

By Nicholas Lee

Adopting A Cohesive GRC Mindset For Cloud Security

By Vidya Phalke

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

By CloudTweaks

2017 Brings DLP Technology and IoT’s Weaknesses to Light

By CloudTweaks

Cloud Infographic – The Future (IoT)

By CloudTweaks

Cyber Security: McAfee on IoT Threats and Autonomous Cars

By Josh Hamilton

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

By Marc Malizia

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

By CloudTweaks

Data Breaches: Incident Response Planning – Part 1

By Sekhar Sarukkai

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

By Jeremy Daniel

Fintech Investments Are Seeing Consistent Growth

By CloudTweaks

Big Data – Top Critical Technology Trend For The Next Five Years

By Mojgan Afshari

How To Overcome Data Insecurity In The Cloud

By Evelyn de Souza

Maintaining Network Performance And Security In Hybrid Cloud Environments

By CloudTweaks

Three Tips To Simplify Governance, Risk and Compliance

By Vidya Phalke

Cyber Criminals Are Business People Too

By CloudTweaks

Cloud Infographic – Big Data Analytics Trends

By CloudTweaks