Tuesday, March 2, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Neural Networks

Who to blame for data breaches — employees or company?

October 2, 2019
in Neural Networks
Who to blame for data breaches — employees or company?
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

In the past few years, data breaches at multinational companies have brought public life to a standstill. More than that, it tarnishes the respective company’s reputation, loss of credibility, and the lost opportunity to gain reputation in the fledgling market. Even though systems eventually are back up, operations are restored, but revenue is lost due to stalled services.

Data breaches wreak havoc. For consumers, whose life now is increasingly dependent on their devices comes to a halt. In December 2018, O2 mobile users’ life came to a standstill. Uber drivers couldn’t go to work and Deliveroo courier couldn’t be delivered. The chaos lasted for more than 24 hours and then O2 claimed culprit was Ericson’s expired software.

You might also like

Google’s Tensorflow Certification & What I’ve Learned Since

How AI Can Be Used in Agriculture Sector for Higher Productivity? | by ANOLYTICS

Future Tech: Artificial Intelligence and the Singularity | by Jason Sherman | Feb, 2021

Before this, on February 2018, Google Cloud Data Store, used by enterprises including Snapchat and Pokémon Go, showed troubles and applications were out, disrupting services across continents. In the last few years, Facebook, Huawei, Marriott among others have been dragged to court for data breaches. User’s personal data is a legally valuable asset and can’t be shared without permission. Data breaches violate that rule and customer’s legal rights.

1. Gemalto, a digital security firm, says, in the first half of 2018, 4.5 billion of records were exposed due to data breaches. This amount of data is enough to crack ways through bank accounts and take out money.

2. QlikView, a risk-based security research firm, reports more than 3,800 data breaches were reported and around 4.1 billion data records were exposed.

3. Most breaches happened at small and medium companies, Qlik View reports. Small and mediums companies usually ignore cybersecurity, making them more prone to cyber-attacks.

4. In 2019, a collection of 2.7 billion records consisting of 774 million unique email addresses and 21 million unique passwords was up for sale on the web. Clearly, somebody hacked into multiple databases, downloaded them, and put the database up for sale.

But who can really tell if these breaches were accidental or due to faulty equipment? Or made purposely? Shred-it, a data and security firm, says data breaches happen due to employee negligence.

Human negligence is a major cause of data breaches. In the aforementioned instances, there could be an employee who erroneously fed in the wrong code or didn’t follow a cyber-security protocol, which led to the disasters. So here who is to blame?

1. 47 % of business leaders believe that human error is the biggest pain point in data security. Cybersecurity measures work as far as encryption and providing protection against the machine and automated threats.

2. About 25 % of employees have the habit of keeping their computers unlocked or unsupervised. Employees take security callously and are unaware of the severity of their behavior.

3. Only 14 % of companies have actually implemented a basic cybersecurity guideline, according to the cyber-security company, Symantec.

Remote work, which is increasingly becoming common among organizations is precarious, as it provides unauthorized access over home wifi or public wifi. According to a survey, over half of employers allowing remote work does not have any standing policy for remote workers or vendors. What’s more astounding? A study revealed one in five business owners after their data breaches traced the fault back to the vendor.

So question here now arises is how can organizations protect themselves against data breach?

Going by the pointers above, the first thing should be to draft a data security policy guideline. However, simply drafting a guideline would not be enough.

1. Employees receive a laptop and other devices from the IT on the first day of their joining. With time, employees install applications on their own and taking through IT and BYOD seems like a pain. Even though, downloading applications without notifying IT is an integrity issue. To ensure that only responsible employees are hired, a thorough background check is required. However, people are hardly honestly in their reviews.

2. Create a checklist of laptops and personal devices given to employees which is the access point of all office data. Have regular audits of these devices and try and keep the audits a surprise. Doing this will keep data breaches at bay.

3. Some employees may be good with technology, while some might need training. Providing is important to educate employees. Further, encouraging employees to report any issues if they spot a data breach will help.

4. Know who’s who of data accessibility will keep a check on the security of data. However, this shouldn’t translate into responsible employees giving carelessly allowing access to other people. Such behavior shouldn’t be tolerated. Insincere employees have been accounted for the biggest cyber-security threats across organizations.

5. Certain organizations allow employees to access social media and office data from the same device. Even allows accessing email on-the-go. Keeping tabs on these will keep data breaches in check.

Keeping data breaches fully checked is definitely not completely controllable. However, organizations can do their best by investing in the above measures. Overall, organizations need to develop cybersecurity policies. Talking about policies. Is your employee exit and on-boarding policies in sync with data security protocol?

Credit: BecomingHuman By: Michael lyam

Previous Post

What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

Next Post

Google expands machine learning capabilities with TensorFlow 2.0 and updates to its Vision AI portfolio

Related Posts

Google’s Tensorflow Certification & What I’ve Learned Since
Neural Networks

Google’s Tensorflow Certification & What I’ve Learned Since

March 2, 2021
How AI Can Be Used in Agriculture Sector for Higher Productivity? | by ANOLYTICS
Neural Networks

How AI Can Be Used in Agriculture Sector for Higher Productivity? | by ANOLYTICS

February 27, 2021
Future Tech: Artificial Intelligence and the Singularity | by Jason Sherman | Feb, 2021
Neural Networks

Future Tech: Artificial Intelligence and the Singularity | by Jason Sherman | Feb, 2021

February 27, 2021
Tackling ethics in AI algorithms: the case of Salesforce | by Iflexion | Feb, 2021
Neural Networks

Tackling ethics in AI algorithms: the case of Salesforce | by Iflexion | Feb, 2021

February 27, 2021
Creative Destruction and Godlike Technology in the 21st Century | by Madhav Kunal
Neural Networks

Creative Destruction and Godlike Technology in the 21st Century | by Madhav Kunal

February 26, 2021
Next Post
Google expands machine learning capabilities with TensorFlow 2.0 and updates to its Vision AI portfolio

Google expands machine learning capabilities with TensorFlow 2.0 and updates to its Vision AI portfolio

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Singapore eyes more cameras, technology to boost law enforcement
Internet Security

Singapore eyes more cameras, technology to boost law enforcement

March 2, 2021
Why do companies fail to stop breaches despite soaring IT security investment?
Internet Privacy

Why do companies fail to stop breaches despite soaring IT security investment?

March 2, 2021
Tweaking Algorithmic Filtering to Combat Fake News
Data Science

Tweaking Algorithmic Filtering to Combat Fake News

March 2, 2021
Machine Learning Cuts Through the Noise of Quantum Computing
Machine Learning

Machine Learning Cuts Through the Noise of Quantum Computing

March 2, 2021
Google’s Tensorflow Certification & What I’ve Learned Since
Neural Networks

Google’s Tensorflow Certification & What I’ve Learned Since

March 2, 2021
Apple’s data-collection ‘nutrition labels’ for apps will begin appearing next week
Digital Marketing

Pinterest powers up creators during stressful times: Monday’s daily brief

March 2, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Singapore eyes more cameras, technology to boost law enforcement March 2, 2021
  • Why do companies fail to stop breaches despite soaring IT security investment? March 2, 2021
  • Tweaking Algorithmic Filtering to Combat Fake News March 2, 2021
  • Machine Learning Cuts Through the Noise of Quantum Computing March 2, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates