It’s the kind of record no one wants to see broken — the U.S. is on pace to see the most data breaches in a single year. No one’s popping the cork in celebration, just thinking of ways to get this harmful, costly mess back in the bottle.
For private businesses and organizations, cybersecurity solutions may seem limited by the resources that can be dedicated to them. But when even large corporations can fall victim to a massive data breach, what hope does a small or medium-sized business have when a determined bad actor attempts to steal consumer or employee data?
Cybersecurity is complicated and constantly changing to keep pace with the evolving nature of the threats that threaten our data, but strong solutions rooted in our national security apparatus are more accessible than a private business owner may realize. In fact, we recommend all businesses adopt Defense Department cybersecurity standards — it’s achievable and affordable.
Read on for a breakdown of the data breach crisis and how to begin adopting stricter cybersecurity strategies.
Why are data breaches proliferating?
Hackers, phishing emails and viruses are nothing new. New data breaches are in the headlines almost daily. With cybercrime being such a pervasive issue, why is it that the world doesn’t have a better handle on it? It’s not like these problems are creeping up on anyone.
Software is complicated, with products interacting on top of different pieces of hardware, such as servers, physical computers, cloud-based systems and more. It’s all a location for potential vulnerability. Sometimes, there isn’t a weakness until a new piece of software is introduced that provides a backdoor that no one would have ever expected. That’s a big reason software and hardware providers roll out regular patches — most of the time, they aren’t offering new features, but fixes for newly identified threats.
It’s an ongoing theme in our digital world. When everyone wants to have the newest, coolest, cutting-edge tech — and there is business pressure to get it to market — there will be vulnerabilities.
Why is our data so valuable?
So, a hacking group based an ocean away commits a data breach and gains access to consumer data from a major U.S.-based retailer, what next? In fact, for most of us whose information has been part of a data breach, the impact was probably unnoticeable. It begs the question of just why someone goes to the effort of stealing it in the first place. Certainly, financial information has clear value, but what about more basic information like an email or the city where you live? What’s so special about it?
Data is a commodity, one that paints a clearer picture of an individual and their habits. For example, when a business knows a consumer’s location, it may change the advertisements it shares (a Hawaii resident probably won’t see as many ads for salt during the winter months as a Minnesotan). That’s a simple example, but when you consider the amount of information a single person may have shared online, privately, or not, about their buying habits, health, finances, friends and behaviors, it’s suddenly not hard to see why data is so valuable. Bad actors online can find plenty of willing buyers for a trove of stolen email addresses and order histories, or they can even leverage an individual’s personal information to threaten their company.
What can private businesses do?
The Defense Department approach is not one thing. It’s a layered defense — the standard metaphor is an “onion” — aimed at being as secure as possible. And while the federal government and military clearly have resources to implement top-of-the-line security measures, many of these agencies’ tactics stem from publicly available guidelines and frameworks that can be leveraged for a private business’s needs.
Here are some tips to begin shoring up cybersecurity with stricter policies: