Posted by: psilva | January 4, 2012

355 Shopping Days Left


After just being bombarded with the endless options of gifts for your loved ones, a simple reminder that the next blitz is just around the corner.  And you are a target.  2011 started relatively tame for breaches but when hacktivism and a few other entities decided to take hold, it became a massive year for lost data.  From retail to healthcare to government to schools to financial institutions – no one was immune.  Household names like Sony, RSA, Lockheed and Sega were all hit.   Privacy Rights Clearinghouse reports that 535 security breaches in 2011 exposed 30 million sensitive records to identity thieves and other rip-off artists.  Since 2005, 543 million records have been breached – almost double the US population and about 7% of the entire world’s population.  Looking at the entire Privacy Rights Clearinghouse list is staggering both in numbers and names. 

It might not get better any time soon.  Since mobile devices have become fixed appendages and continue to dominate many areas of our lives (phone, entertainment, email, GPS, banking, work, etc), the crooks will look for more ways to infiltrate that love affair.  I suspect that mobile financial (payment/banking) apps will get a lot of attention this year as will malware laced apps.  Our health information is also at risk.  Medical records are being digitized.  A 2009 stimulus bill included incentives for doctors and hospitals who embrace electronic health records.  The CDC saw a 12% increase from last year – now 57% of office-based physicians use electronic health records.  The inadvertent result is that the number of reported breaches is up 32% this year according to Ponemon Institute.  That cost the health care industry somewhere in the neighborhood of $6.5 Billion.  Now you might think that you have less control over a health provider’s systems than your own mobile device.  While mostly true, close to half of those case involved a lost or stolen phone or personal computer.  Some sort of human element involved. 

It is really up to each of us to practice safe computing and, if you’re knowledgeable, share insight with those who are not tech savvy.  Yes, you can be the most cautious internet citizen and still be a victim due to someone else’s mistake, oversight or vulnerability.  Even so, it is still important to be aware and do what you can.  For centuries we’ve been physically protecting our property, neighbors, towns, identity and anything else important to us.  At times, the thieves, enemies and otherwise unwanted still got in and created havoc.  Advances and admissions, plus the value of whatever needed protection kept the battle going.  It continues today in the digital universe.

ps

References

Technorati Tags: F5, banking, trojan, Pete Silva, security, business, education, technology, application delivery, ipad, cloud, context-aware, mobile, iPhone, web, internet, security, android, privacy, smartphone

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: