What’s Worse Than Stolen Data? Altered Data

What’s Worse Than Stolen Data? Altered Data

What’s Worse Than Stolen Data? Altered DataWhat’s Worse Than Stolen Data? Altered Data

Cyber-criminals are not only stealing data and accessing organizations’ data inappropriately—they’re altering it. Here’s a look at the 2016 security landscape.

Strategic Data Manipulation and DisruptionStrategic Data Manipulation and Disruption

Organizations will start to realize that cyber-criminals are not only accessing their data inappropriately, they are tampering with it.

Consequences of Undetected Data ManipulationConsequences of Undetected Data Manipulation

When data is unknowingly manipulated, company decisions will be made based on false data. That can lead to devastating consequences because that can taint mixed compounds, control systems and manufacturing processes.

Increasing Attacks on Application Service ProvidersIncreasing Attacks on Application Service Providers

As organizations become more comfortable with the “as-a-service” model and aggregate valuable data on the cloud, that data will become a lucrative target for cyber-criminals and cyber-espionage. A deeper appreciation of third risk party is needed.

Hacktivism and the Attack SurfaceHacktivism and the Attack Surface

As cyber-attack tools and services become more commoditized, the cost of attacking an organization will drop dramatically. Result: more attacks whose primary focus is not financial gain.

Sophisticated Activist Collectives to Join Cyber-VigilantesSophisticated Activist Collectives to Join Cyber-Vigilantes

Unsophisticated cyber-vigilantes have joined sophisticated collectives such as Anonymous. Financial gain is no longer their main goal, so enterprises must broaden their understanding to include what, why, where, and how they are being targeted.

Industrial Control Systems Faces ThreatsIndustrial Control Systems Faces Threats

Attacks on Industrial Control Systems (ICS) that control chemical, electrical, water and transport have increased 17-fold during the last three years. Automated sensors are exacerbating these issues. A critical breach of an ICS is extremely likely.

Too Much VC and Snake OilToo Much VC and Snake Oil

The high-tech industry has been awash in venture capital, and foolish investments have been made. As organizations’ security programs mature, they will realize that claims of preventing advanced threats are fantasies.

Shakeout of the Security IndustryShakeout of the Security Industry

Expect a shakeout in the security industry as organizations’ understanding of advanced threats mature and increasingly drive their security investment decisions.

Karen A. Frenkel
Karen A. Frenkel
Karen A. Frenkel is a contributor to CIO Insight. She covers cybersecurity topics such as digital transformation, vulnerabilities, phishing, malware, and information governance.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles