Source |
AlienVault Blog |
Identifiant |
1803677 |
Date de publication |
2020-07-14 11:00:00 (vue: 2020-07-14 12:05:48) |
Titre |
The damaging impact data breaches have on American society as a whole |
Texte |
This blog was written by an independent guest blogger.
In the age of the internet where everyone has a mobile phone and multiple social media profiles, one phrase has become synonymous with doom and dread - data breach. It seems like these breaches have become a regular occurrence in modern society.
Small businesses may be particularly susceptible to security hacks, but even large corporations are not immune. Consumers may assume big companies have the best security systems in place, but hackers are savvy and can find their way around these measures.
One of the biggest data breaches in recent memory was to Marriott International from 2014 to 2018, where valuable information from over 500 million customers was stolen by hackers. The hackers were able to get into the Starwood hotel brand’s system and remain there after Marriott acquired the company, giving them access to an even greater array of data.
Not only did this breach impact many customers’ private information, but it also impacted foreign politics. The attack could be traced back to Chinese hackers, which is influencing potentially one of the biggest trade deals in modern U.S. history.
Data breaches go far beyond customers needing to get new credit cards. It can drastically impact consumer trust and even impact foreign affairs. In the long-term, the devastation caused by such hacks can be even worse than most people, businesses, and politicians realize.
Quantifying the loss and damages that result from a data breach
Destruction may seem like a strong word when dealing with security hacks. However, as you look closely, you may find that it’s an appropriate term.
When you try to explain the kind of destruction caused by a data breach, where do you begin? The easiest would be in relation to how much the data breach costs a company. After all, a dollar amount placed on such a scandal would make it easy to quantify how bad one breach is to another.
However, data breaches go beyond losing companies’ money in the short-term. They can also have long-term psychological impacts. Thanks to the internet, no one forgets anything anymore.
Once people learn a company failed to take adequate security measures to protect their customers’ data, they won’t forget.
There are many ways for companies to build cybersecurity policies. It may seem expensive right now, but the potential losses a business may suffer from a data breach make security measures seem like pennies in a bucket.
That loss of trust will become even more pronounced if the data breach was the result of something that should have easily been avoided. For example, in the Marriott case, hackers were able to gain access to millions of people’s private information due to two employees’ login credentials becoming compromised.
If just those two workers had taken better security measures, then the whole thing could have been avoided. That information, combined with rebranding efforts to gain back consumer trust, adds up.
Data breaches can be prevented, and while security measures may seem unnecessary or expensive now, it pales in comparison to what a company has to deal with in the aftermath of a hack. Suddenly, it’s no longer millions |
Notes |
|
Envoyé |
Oui |
Condensat |
“for 2014 2018 500 able access acquired active additionally adds adequate advertising affairs afford after aftermath age all already also american amount another any anymore anything apart appropriate apps are around array assume attack authentication authorities automatically available avoided aware away back backlash bad because become becoming been begin being best better beyond big biggest billions blog blogger brand’s breach breaches broke brute bucket build building business businesses but cameras campaign can can’t card cards care careless case caused cautious chance chances change check chinese closely combined come companies companies’ company company’s comparison competition compliant compromised constant consumer consumers contact continue convenience corporations costs could couple credentials credit crimes crucial customers customers’ cyber cyberattack cybercrimes cybersecurity damages damaging dark data deal dealing deals defending demand destruction devastation dial did disposal does doesn’t dogs dollar dollars don’t doom dozens drastically dread dss due easiest easily easy effective efforts email employees’ encryption enforcement establish even every everyone examining example expensive explain extra fact failed falling far features feel fences financial find force forced foreign forget forgets from gain general get getting give giving gone good great greater guest hack hacker hackers hacks had hands hang happening has have having help highly history holds hotel house how however iceberg immediately immune impact impacted impacts important independent indicates individuals influencing information international internet isn’t it’s itself just keep key kind knowing large last law learn like likely list litany livelihood login long longer look looking lose losing loss losses lost lot mailing major make making managers mandatory many marketed marketing marriott may measures media memory methods million millions mind mobile modern money monitoring more most much multiple name need needing needs networks new news nice not now numerous occurrence often oftentimes once one online only onto opportunity order ordering organization other out over own owners pales particularly parties password passwords pci peace pennies people people’s phone phrase place placed plenty policies politicians politics population portion potential potentially presents prevent prevented primary priority privacy private problem products profiles pronounced protect protection provide psychological public purchase purposes put puts quantify quantifying quickly quiet quo realize rebranding recent recovered reduce regardless regular relation remain remaining remains report research result right risk run safe sale same savvier savvy scandal security seem seems serious serve service services set shoddy short should sign significant signing similar simply size small smaller smallest social society someone something special stand starters starwood status steps stolen strong such suddenly suffer surrendering susceptible synonymous system systems take taken takes taking tend term than thanks them then there’s these they’ll they’re thing think third those though time tip tls tools traced trade traffic transactions true trust truth try two unaware under unless unnecessary use utilize valuable value virtual want way ways web well what when where which who whole why will without won’t word workers world worse would written wrong year years you’re you’ve your |
Tags |
Data Breach
|
Stories |
|
Move |
|