It’s safe to say that 2015 will be remembered as the year corporate data loss entered the mainstream. It seems like every week there was news around another major data breach or cyber attack. Indeed, throughout the course of the year many records were broken – and not in a good way. This year, there have been 766 data breaches affecting a total of 177,840,420 records, more than double the records breached in 2014. And that’s only the breaches we know about or whose numbers have been disclosed.
While it may seem that no organization was safe this year, there were clear winners and losers when it came to data security in 2015. With that in mind, I wrote an article for IT Security Guru outlining The Data Winners and Losers of 2015.
Data Loss Losers of 2015
- Major Household Names – We bet you can name at least one major data breach this year. Breaches were caused by a variety of methods proving that there are almost a limitless number of ways data can be lost.
- Data Projects – Seeing the damage wrought by data breaches, many organizations are now wary of data-led initiatives, which has wide-reaching implications from productivity losses to a loss of competitive edge.
- Internet of Things (IoT) – We’ve already seen this year how a zero-day exploit could allow hackers access to a connected car, and research has shown that many connected things don’t even use basic security measures, making them an obvious route for hackers to exploit.
Data Loss Winners of 2015
- Regulation – There have been many high-profile fines handed out both in the US, from the FTC and industry-specific regulators, and from the ICO in the UK. With more regulators stepping up, and the new EU GDPR on the horizon, the consequences of a data breach are more serious than ever.
- Effective Data Protection Policies – When large brands, with large IT budgets, announced data breaches many organizations took stock of their own data protection policies.
As I note in the full article, the real winners may have been the hackers, who successfully managed to breach so many firms. However, organizations looking to the future can learn from the mistakes of 2015 to ensure they don’t end up on the “data loss losers” list for next year.
Absolute can help you identify potential security threats and respond rapidly before they become damaging security incidents. Absolute Data & Device Security (DDS) allows organisations to persistently track and secure all of their endpoints within a single cloud-based console. Computers and ultra-portable devices such as netbooks, tablets, and smartphones can be remotely managed and secured to ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced. Learn more here.