What's Driving Cyber Attacks?
The threat of cyber attacks has existed since data went digital, but it seems as though the significance of cyber security has significantly increased…
October 18, 2017 at 11:16 PM
3 minute read
The original version of this story was published on Law.com
The threat of cyber attacks has existed since data went digital, but it seems as though the significance of cyber security has significantly increased in recent years. So, what exactly is driving this spike in cyber attacks today? Money, according CEO of Evident ID David Thomas.
Inside Counsel sat down with Thomas to explore the evolution of cyber security. Criminals can easily monetize the data they are stealing either by leveraging it themselves for fraudulent activity, or by selling it. Either way, they are getting paid. And, their opportunity is enormous because companies are handling and collecting more and more personal information. A hacker only has to find one vulnerability – one small lapse – and can potentially get access to volumes of sensitive personal data.
“Any security breach should be taken seriously,” he explained. “The potential damage to a business's reputation and credibility with its users is difficult to replace, no matter the scale or depth of a breach.”
That being said, in considering the degrees of severity of breaches, we should look at the volume and type of information that is stolen as well as the impact on those that are affected. For example, stealing billions of email addresses and passwords is a serious threat with many ramifications, but the theft of millions of users' Social Security numbers and identities is devastating in ways that will be felt for years to come.
So, what type of proactive steps can firms take to protect their client's data?
Companies need to reevaluate the way they store and manage sensitive personal data, per Thomas. They can now acquire the verified personal data they need without having to hold or manage personally identifiable information (PII) in one place. Any centralized database holding personal information will be vulnerable to a breach. The only way to prevent that is to find a streamlined solution that allows businesses to connect to the data that is needed to operate without requiring them to be responsible for holding and protecting that data within their infrastructure.
“Companies should work with partners that will proactively help them get the business answers they need while reducing their overall risk. More than likely, this will mean changing the way a business is currently obtaining and holding personal data,” he explained.
The traditional security infrastructure and centralized database approach are no longer secure. In the digital world, businesses need to evolve their thinking to a solution that easily integrates with their system, gives them opportunity to get more information, and removes the risk that comes with every personal data interaction.
Unfortunately, the threat of a cyber attack will always be there. The bad guys are getting smarter and actively looking for opportunities to access large volumes of data with the least amount of effort.
Thomas advises, “The only way for a business to decrease the risk of a cyber attack is to make cybersecurity a priority and change the way personal data is currently acquired, shared and stored.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllGC With Deep GM Experience Takes Legal Reins of Power Management Giant
2 minute readLegal Departments Gripe About Outside Counsel but Rarely Talk to Them
4 minute read'Serious Disruptions'?: Federal Courts Brace for Government Shutdown Threat
3 minute readUS Reviewer of Foreign Transactions Sees More Political, Policy Influence, Say Observers
Trending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250