At the turn of the year we launched Security Predictions for 2014 and Beyond – our attempt to anticipate the major trends in cyber space impacting businesses over the coming years. For anyone doubting our prediction that 2014 would see at least one major data breach incident per month, the past few months will have been an eye-opener. Worryingly for businesses and their customers, we’ve actually seen far more than that.
From Sally Beauty to eBay
The personal details of millions of customers have already been exposed and we’re barely a quarter of the way through 2014. Big name US brands including Michael’s, Neiman Marcus and Sally Beauty have all confessed to being breached by attackers. Just this month, one of the world’s biggest and best known internet firms, eBay, urged its 128 million users to change their passwords after admitting a key database had been accessed by cyber criminals.
Firms hit by a breach have to cope with the financial blow of possible regulatory fines, litigation, a stock price slump and costs associated with clean-up and remediation. They must also deal with the almost unquantifiable damage to brand value which can lead to a customer exodus and serious long-term repercussions from which some – like Dutch certificate authority DigiNotar – never recover.
The message is clear: data breaches are here to stay. But what can be done to help mitigate the risk of attack and how, as users, can we improve password security to avoid our own online accounts being hacked?
Trend Micro to the rescue
Well, there are no easy answers but here at Trend Micro we’ve drawn on our 25 years in the information security space to bring you a dedicated resource page, providing all the information you’ll ever need about data breaches and password security. Accessible online here, the site features advice for small businesses on the top 5 major security risks; helpful information for enterprises on how to protect IT systems and data centers; and even a behind-the-scenes look at the anatomy of a data breach.
There are also a few tips on how to create secure passwords and we explore alternative authentication systems including the iPhone’s Touch ID fingerprint scanner.
There’s no silver bullet when it comes to protecting your organization from a data breach, but we hope by providing resources like this and improving education we can at least help stem the rising tide of incidents.
Please add your thoughts in the comments below or follow us on Twitter; @TrendMicro.