Now is the time for companies to take a fresh approach to protect their data.
At this very moment someone, somewhere in the world may be plotting to hack into an organization’s critical network infrastructure. Creativity, time and investment are never in short supply when determined attackers are intent on gaining access to networks. It’s created an environment whereby solutions to prevent attacks are being developed just after new hacking tactics are deployed. To solve this divergence, we need to focus on “cyber at machine speed”—implementing new tools simultaneously with or even before hackers.
In short, getting the basics right is no longer enough. Adversaries now have the tools, the motivation and certainly the persistence to overcome current standards and compliance protocols.
Simply put, adequacy is no longer adequate.
Companies that collect, store and leverage valuable and sensitive data are increasingly vulnerable to attack in a threatening cybersecurity landscape. In 2015 alone, nation-state actors purportedly targeted several major health care companies. Out of thousands of breaches, just 10 exposed the health records for 112 million U.S. customers, with Premera Blue Cross, Anthem, CareFirst BlueCross BlueShield, UCLA Health System and Excellus BlueCross BlueShield among the victims.
No comments:
Post a Comment