Four Factors That Drive-Up Data Breach

Computers are an integrated part of business operations; data security is an important factor for companies. Protecting the data that the companies generate is a necessity. One of the main targets for hackers is a company’s big data. Companies are utilizing big data to analyzed trends and patterns, that are then used to make strategic business moves. Unfortunately, the security that surrounds that data is lacking. Big data is name so from the volume, speed and diversity of the data being collected. The potential amount of big data causing concerns on how to properly protect it. Per author Espenson, “according to an anonymous survey from HP security Voltage found that 70 percent of respondents said their business uses at least on form …show more content…
One of the top four factors that drive-up data breach cost involves mobile devices. Stolen or lost mobile devices involving data breaches cost roughly $23 per breach more. The unknown author also discusses the damage to the companies’ brand by loss of reputation. Your organization will need a plan on how to manage the loss of reputation, maintain the cost and the disruption to daily business, also to keep within your states law (Your Organization Needs A Plan, …show more content…
The very publicized 2013 retailer data breaches used nine basic pattern, accounting for 95 percent of the breaches. The sophistication of the hackers is not the main issue here, however the lack of security is a major factor. Due to the lacking data security, the Federal Trade Commission did file complaints against the businesses involved in the incidence. The FTC Act, gives the Federal Trade Commission authority to regulate the data security and hold companies liable (Sargent, 2015). Per author Curran, a new Data Security Act of 2015 does “establishes a national data security and breach notification standard for financial institutions and retailers to better protect consumer’s finical data” (Curran, 2015). The bill does also require the notification of all parties who information was involved in the breach. Another big aspect of the bill does require development of information security plans that are updated on a rolling basis, to keep current with the changing technology. The bill does require that organizations have safeguards implemented that would address “reasonable foreseeable” data security risks (Curran,

Related Documents