Why are Data so Vulnerable?
Data breach has become very common. Every year more and more data breach cases are in the news. We can guess that there would be more data breach cases than those are leaked.
Weak security strategy is the main reason
Why is data so vulnerable? Weak security strategy is the main reason. Hackers are also getting more skilled. They are paid to hack data. Even hackers are also hacked.
It is learned that Equifax blamed a single employee responsible who forgot to install an update of a program. As if that very update of the program could have prevented the Equifax data breach!
Many vendors are still using obsolete software, such as Microsoft XP
But it is also true that many financial service providers are reluctant to upgrade their software because of associated cost and service disruption. Many vendors are still using the Microsoft XP which has been made obsolete since 2014. I have seen many ATMs which are still running Microsoft XP.
Most data were used to be stored unencrypted
Most data were used to be stored unencrypted. This is the most vulnerable cause. The hackers can't use the hacked data If the data are encrypted. News says that only 4% of data breaches after 2013 were security breaches. There the data were encrypted so the hacked data were useless to the hackers and safe for the people.
Recent news says, "Hackers use antivirus software to hack data"
News says, "Hackers use antivirus software to hack data". Windows computer users have a deep security concern. While you install the antivrus software, there remains a loop hole. Your private data can be stolen while updating it. My felling is that using GNU/Linux is a easy way you can avoid needing antivirus.
How data vulnerability can be tacked?
Cybersecurity is a big challenge in this Internet woven world. The personal and financial data are prone to security threats every now and then. Unless a proper data security strategy is adopted, the online future will face a touch challenge for data protection.
What is happening around data security? Are the financial giants doing it right with the precious customer data? I will be happy to get your views, counter views and suggestions. Please share the post among your network.
My research on facial recognition using 3D shape-sensing technology and multimodal fingerprinting is the cutting edge in biometric security. I have presented my research at the 2016 SPIE Defense + Security conference in Baltimore.
Here are some other posts I authored:
- Glasses-Free 3D Displays Empower Smartphones, TVs, Tablets and Digital Signage
- Memory-Driven Computing is the Next Big Thing
- Why GNU/Linux is not Accepted by the Academic Community?
- Unix-like Operating Systems are Safer to Malware and Virus Attacks
- Why Google and Microsoft Run after Glass and Lens?
- Power of a LinkedIn Connection
- Best Solution to Software Virus
- Need 15 Tips to Eat a Biscuit?
In June 2015, Dr. Jeffrey Strickland and I founded a new LinkedIn Group called "The Unfluencers". To learn about the history of "The Unfluencers" please read the seminal LinkedIn article by Dr. Jeffrey Strickland entitled -- "Who are the Unfluencers". This group is an open group. You are welcome to join this group and engage yourself in the discussions. The Unfluencerᵀᴹ Logo is a registered trademark of Dr. Jeffrey Strickland.
Text Copyright 2017 Debesh Choudhury — All Rights Reserved
----------------------------------------------------------
Debesh Choudhury is an academician and researcher. He is interested in the science and engineering of optics and electronics. He uses GNU/Linux, Free and Open Source Software for all his works related to computers, be it educational or entertainment, professional or personal.
Articles from Debesh Choudhury
View blogHave you read articles of Jason Versey ? In his #writing the black texts help seeing the colors of l ...
Social Media, Social Media and Social Media. Can we survive without the social media? It is almost a ...
Normal displays are able to display only a 2D view, but real world is in 3D · Electronic digital dis ...
Related professionals
You may be interested in these jobs
-
Security&GA supervisor
Found in: Betterteam US S2 T2 - 3 weeks ago
Foxconn Bangalore – Chennai Expressway, India Full timeSkill Requirements: · 1. Having more than 8 years of experience in GA/security management of enterprises; · 2. Having experience in promoting GA projects from 0 to 1 is preferred; · 3. Being able to adapt to long-term work in India; · 4. Using English as work language, having mor ...
-
Senior Solution Architect
Found in: Appcast Linkedin IN C2 - 2 days ago
Talent500 Chennai, IndiaFord Motor Credit Company is modernizing its legacy Platforms to transform the business and unlock and unleash the power of data for improving customer experiences, regulatory compliance & operational efficiencies. We are rearchitecting our core applications and platforms and mov ...
-
Network Administrator
Found in: Appcast Linkedin IN C2 - 2 days ago
Onclusive Navi Mumbai, IndiaAbout Us: · Onclusive is a global partner for PR and Communications success. We combine industry-leading data science with an international consultancy and best-in-class PR workflow tools. Our technology, insights and expertise make sense of the fractured, fast-moving media world ...
Comments
Debesh Choudhury
6 years ago #10
And the right technology strategy is required to get rid of the problem associated with #DataBreach
Debesh Choudhury
6 years ago #9
More self awareness is required .. I agree with you Franci\ud83d\udc1dEugenia Hoffman, beBee Brand Ambassador .. We should be more careful about our own security over the Internet
Debesh Choudhury
6 years ago #8
Excellent view Martin Wright .. Security depends on how much we take care about everything .. the smaller details can cause huge damage. Since information is exchanged electronically through the Internet, it has become a challenge for the users as well as the service probiders
Martin Wright
6 years ago #7
Debesh Choudhury
6 years ago #6
Thanks Numo Quest for your follow up reply. The real world is not digital but fuzzy. So the solution to real world problems would also come from fuzzy considerations. Moreover, the solution won't be exactly one. There could be multiple solutions to a single problem.
Debesh Choudhury
6 years ago #5
Thanks a lot Numo Quest for your long comment to my small post. The problems are experienced everyday but they come in different forms. So there can't be an exact solution. Now digital is more fuzzy than exact digital. There comes the very often used artificial intelligence (AI). Then AI will never give an easy solution. That is why it is a long run. It is now a battle between the AI of the ethical hackers and the unethical hackers or the criminals.
Debesh Choudhury
6 years ago #4
Thanks @Zacharis for sharing the links of the videos on cybersecurity
Debesh Choudhury
6 years ago #3
Banks are the most affected and hence the public .. Thanks Pascal Derrien for your time
Zacharias 🐝 Voulgaris
6 years ago #2
Pascal Derrien
6 years ago #1