2015 Was the Year of Big Data Breaches
Will 2016 See More Solutions?
One hundred thousand healthcare records, 22 million current and former federal employees' personnel records and, of course, Ashley Madison.
2015 saw some of the largest and nastiest data breaches in recent years. It's a trend security experts don't think will abate in 2016 even though a bevy of surveys indicate that business leaders place cybersecurity as a top priority.
The truth is, there are still large numbers of decision-makers that either think they are protected or don't think they are a target.
In fact, surveys produced by major insurance companies
say that 82 percent of small to mid-sized business owners don't believe they are a target for cyber-attacks, despite ongoing research
that small and mid-sized markets are a hacker's new favorite playground.
Sword & Shield experts say that smaller companies who create a niche market by expanding their data security protections and promoting that fact may see some successes at the expense of their less-secure competition.
The worldwide cybersecurity market is expected to grow from $77 billion in 2015 to more than $170 billion in 2020 and the U.S. government has budgeted a whopping $14 billion to spend on cybersecurity in 2016.
Our team created a list of data security issues they expect to see in 2016:
- Healthcare will continue to be a highly valued target for cybercriminals. Healthcare information is often 10 times more valuable than financial information like a credit card number on the black market because hackers can sell identities using personal data, create fake identifications to buy medical equipment or drugs and file fraudulent claims with insurance companies.
- Many hacks will continue to exploit the "simple things" that companies and/or employees should have been trained to avoid such as default or easily guessable credentials. Our experts think they will still be exploiting decades-old vulnerabilities and discovering that IT departments haven't been updating patches.
- Hactivists will breach a presidential candidate's campaign site. Our experts don't know which candidate(s) will be the target, only noting that it will be the first candidate that proposes something against the hactivists' cause.
- An increase in data breaches for credit data processed by credit bureaus, mortgage companies, title companies and any other company that handles loan applications. These organizations hold valuable data caches on consumer identities.
- Despite resistance by privacy advocates, the U.S. government will be successful in getting an encryption backdoor/bypass in tech products. The government will use the war on ISIL/terrorism to accomplish this.
- Cloud breaches. From Amazon to multi-tenant cloud services, our experts think the cloud will continue to be targeted and at least one major high-profile hack of a cloud provider is in store for 2016.
Whether these predictions come true is yet to be seen, but one thing our experts all agree on is that cybersecurity is needed on all fronts.
At Sword & Shield, your security is our No. 1 priority. Please call us at 865-244-3500 or email us at email@example.com
to see how we can make 2016 your secure future.
Now Offering CISSP Training Through (ISC)2
The challenge to protect the information that is both shared and available online continues to grow as the Internet expands. Companies and governments are spending billions of dollars to secure their data and prevent outside attacks. They need employees who are skilled in thwarting these attacks.
Obtaining a Certified Information Systems Security Professional (CISSP) certification shows you are an expert in information security.
Sword & Shield's official five (5)-day (ISC)2
CISSP Training gets you trained, certified and back to work within a week with the skills necessary to protect your organization from hackers, attackers and security threats. Our program delivers the most up-to-date, authorized content and is backed by our certification process. The course includes an exam voucher that can be used at any (ISC)2
-approved testing facility.
Join us March 7-11, 2016 in the classroom or online.
We are also holding an (ISC)2
Healthcare Information Security and Privacy Practitioner (HCISPP) course April 11-15.Register Now
Join Our "Addressing Your Advanced Threats" Webinar Friday, Feb. 5, 2016
Today's cyber attacks are more stealthy and malicious than ever before and are programmed to remain unnoticed for as long as possible until an opportune time in the future to inflict damage.Breaches, state-sponsored hacks and loss of confidential data dominate the news cycle. From this we see that cyber intrusions are mainstream and frequent (and this is just what is disclosed).
Every organization has digital information of value and adversaries want it. Data breaches can result in fines, a loss of revenue, legal fees and damage to your reputation.
Sword & Shield Director of Computer Forensics and Security Assessments Bill Dean will describe the threat landscape and the steps organizations should take to protect themselves during this hour-long webinar.Register Here
Online Magazine Features Sword & Shield
, an online technology magazine out of East Tennessee, has featured a three-part series on Sword & Shield and the company's President and CEO John McNeely
The magazine is sponsored by Pershing, Yoakley & Associates, P.C.
and features "all things" related to technology, innovation and entrepreneurship in the region. The website's goal is to help create more awareness of East Tennessee's assets.
The series was written by Pershing Yoakley's Chief Alliance Officer Tom Ballard
and chronicles Sword & Shield's birth and growth.
Read the series: