ITEXPO Keynoter Asks 'Is Your Data Safe?'

By

Is your data safe? This is a question every organization should be asking. Cybercrime is evolving, and what evil doers want is your data. And, as ITEXPO day two gets underway, Gary Davis Chief Consumer Security Evangelist McAfee offered come frightening insight in this evolution. For starters, 71 percent of all attacks start with a phishing attack, and of the departments in the enterprise most vulnerable is human resources.

Today, data is currency. Data serves as a proxy, Davis highlighted this with Facebook’s acquisition of WhatsApp. He explained the reason Facebook paid $21 billion for WhatsApp was a $55 on each user’s data. In addition to this shift in paradigm, crime continues to develop new ways to enact their nefarious deed.

Crime was once a proximity-based venture, but as Davis noted, “most are happening behind international borders drinking Mountain Dew and eating nachos,” with an extremely low likelihood of justice. Virtual based crime changes the game, big time.

Davis put a number on the impact of these attacks amounting to $600 billion. And if you were curious that’s .8% of the world GDP. For this reason it’s paramount this is addressed. He noted, the McAfee global threat intelligence cloud possesses 1 petabyte of data. That’s right, a petabyte with a “p.” There are 55 billion queries made against this data – that’s right, billions with a “b.” As Davis put it, “We take a lot of data and use this data for valuable insights.”

There are a few more numbers of import here. Malware attacks are up 22%, mobile malware has grown by 80% and ransomware to the tune of 59%. While these stats may grab your attention, these growth rates are dwarfed by mining malware, which is up 4,000%.

At the heart, it’s important to let history be our teacher, “when we rely on something for everything we do it attracts bad guys,” explained Davis. Regardless of the technology exploited, this is the reality. From SSL, blockchain and beyond, secure technologies are evolving. And while this cat and mouse game is making some of the world’s largest enterprises look silly, the opportunity exists to defend the most valuable resource in your organization – data – with data.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE
Related Articles

Technological Tools For Enhancing Post-College Job Placement: Leveraging Linkedin, Job Boards, And Virtual Career Fairs

By: Contributing Writer    12/8/2023

Recent graduates face the challenge of standing out in a crowd of qualified candidates. Fortunately, with the advent of technology, powerful tools are…

Read More

What Is Software Mapping?

By: Contributing Writer    12/8/2023

Software mapping is the practice of diagramming and visualizing the intricacies and dependencies within a software system. It gives a bird's eye view …

Read More

What Is Attribute Based Access Control?

By: Contributing Writer    12/5/2023

Attribute-Based Access Control (ABAC) represents a paradigm shift in managing access rights within complex and dynamic IT environments. Unlike traditi…

Read More

Raising Value: The Strategic Gains of Embracing Bundled Result

By: Contributing Writer    12/4/2023

Where the concept of value is not just a price tag but a carefully crafted now. In a world brimming with options, the art of planned bundling has aris…

Read More

Tech Innovation in iGaming

By: Contributing Writer    11/29/2023

iGaming is one of the fastest growing industries on the internet. For those who may not be aware, iGaming refers to online casinos, online slots, poke…

Read More