Most organizations and consumers believe there is a need for IoT security regulation

90% of consumers lack confidence in the security of Internet of Things (IoT) devices. This comes as more than two-thirds of consumers and almost 80% of organizations support governments getting involved in setting IoT security, according to Gemalto. “It’s clear that both consumers and businesses have serious concerns around IoT security and little confidence that IoT service providers and device manufacturers will be able to protect IoT devices and more importantly the integrity of the … More Continue reading Most organizations and consumers believe there is a need for IoT security regulation

Number of lost, stolen or compromised records increased by 164%

According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last six months of 2016, the number of lost, stolen or compromised records increased by 164%. A large portion came from the 22 largest data breaches, each involving more than one million compromised records. Of the 918 data breaches more than 500 (59% of all breaches) had an … More Continue reading Number of lost, stolen or compromised records increased by 164%

1.37 billion data records compromised globally in 2016

Gemalto’s Breach Level Index revealed that 1,792 data breaches led to 1.37 billion data records being compromised worldwide during 2016, an increase of 86% compared to 2015. Identity theft was the leading type of data breach in 2016, accounting for 59% of all data breaches. In addition, 52% of the data breaches in 2016 did not disclose the number of compromised records at the time they were reported. The Breach Level Index (BLI) is a … More Continue reading 1.37 billion data records compromised globally in 2016

IoT MSSPs market revenues to top $11 billion in 2021

Industrial applications are set to be the core focus for IoT Managed Security Service Providers (MSSPs) with ABI Research forecasting overall market revenues to increase fivefold and top $11 billion in 2021. Though OEM and aftermarket telematics, fleet management, and video surveillance use cases primarily drive today’s IoT MSSP service revenues, continued innovation in industrial applications that include the connected car, smart cities, and utilities will be the future forces that IoT MSSPs need to … More Continue reading IoT MSSPs market revenues to top $11 billion in 2021

The rising use of personal identities in the workplace

90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. However, with 68% saying they would be comfortable allowing employees to use their social media credentials on company resources, Gemalto’s research suggests that personal applications (such as email) are the biggest worry to organisations. The enterprise and consumer worlds are merging closer together, with enterprise security teams under increasing pressure to implement the same type of … More Continue reading The rising use of personal identities in the workplace

Identity and personal data theft account for 64% of all data breaches

Data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015, according to Gemalto. Worldwide, there were 974 reported data breaches and more than 554 million compromised data records in the first half of 2016, compared to 844 data breaches and 424 million compromised data records in the previous six months. In addition, 52% percent of the data breaches in the first half of this year did … More Continue reading Identity and personal data theft account for 64% of all data breaches

Cyber attacks: Hindsight is 20/20, GDPR is even better

The dust is beginning to settle on the EU referendum result. But, while the UK’s departure from the union is set to shake things up for many businesses nationwide, there’s at least one EU ruling that UK businesses will still have to comply with: the General Data Protection Regulation. As cybersecurity experts are all aware, the upcoming GDPR was established with the aim of protecting EU residents’ data. It means that businesses will have to … More Continue reading Cyber attacks: Hindsight is 20/20, GDPR is even better

Only a third of sensitive data stored in cloud-based applications is encrypted

Despite the continued importance of cloud computing resources to organisations, companies are not adopting appropriate governance and security measures to protect sensitive data in the cloud, according to a new Ponemon Institute study that surveyed more than 3,400 IT and IT security practitioners worldwide. According to 73 percent of respondents, cloud-based services and platforms are considered important to their organisation’s operations and 81 percent said they will be more so over the next two years. … More Continue reading Only a third of sensitive data stored in cloud-based applications is encrypted

A third of organizations experienced a data breach in the past 12 months

Despite the increasing number of data breaches and more than 3.9 billion data records worldwide being lost or stolen since 2013, organizations continue to believe perimeter security technologies are effective against data breaches, according to Gemalto’s Data Security Confidence Index. Of the 1,100 IT decision makers surveyed worldwide, 61% said their perimeter security systems (firewall, IDPS, AV, content filtering, anomaly detection, etc.) were very effective at keeping unauthorized users out of their network. However, 69% … More Continue reading A third of organizations experienced a data breach in the past 12 months

It’s time to kill the static password

How do you manage your passwords? Do you set them all to approximately the same value, for fear of forgetting them? Or do you write them down in a little book, or in a spreadsheet? Perhaps you use clever character combinations or a piece of software to manage them on your behalf? If you feel passwords are a struggle to manage, you are not alone. A recent UK Government study found that nearly half of … More Continue reading It’s time to kill the static password