Building trust in an era of constant threats

Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of…

OpenText profile picture

OpenText

June 29, 20204 minutes read

Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of data are created each day. As more and more information goes digital and technology advances, cybercrime also rises with the number of reported breaches up 54% from 2018 to 2019. Understanding the location of digital information and who has access is the Information Advantage organizations need to stay secure.

In today’s “zero-trust” world, all businesses must assume there are bad actors who want to grab their data. Protecting corporate, customer and personal data not only makes good business sense, it has become an imperative. Organizations need to build greater customer trust in the ever-growing digital universe. Because, if you can’t trust a business to keep data safe and secure, then you can’t trust the business.

Cybersecurity and your data

Digital transformation has presented organizations with new cyber risk management challenges. In boardrooms around the world, more and more conversations are taking place around cybersecurity and digital strategies to safeguard data. And yet, many businesses still experience a disconnect between their perception of adequate cybersecurity, and what’s truly needed to protect their data.

Every 39 seconds, hackers somewhere are attacking computers with internet access. For the financial services sector in the US alone, the cost of cybercrime rose 40% between 2013 and 2017, costing companies an average of more than $18 million per year.

Today’s businesses know a lot about us—our daily habits, our shopping preferences, our viewing tastes, our political beliefs and more. While many people think smart devices are listening to conversations, let’s look at the reality. The devices aren’t necessarily listening but accurately predicting your behavior through analytics, machine learning and AI, using data about all your digital activities.

While that digital data might be anonymized, one study found most Americans today can be identified by putting together just 15 pieces of such anonymous data. The researchers said that on average, using gender, birth date and ZIP code, people have an 83% chance of being re-identified.

This means that when data falls into the wrong hands, the potential consequences can be significant and far-reaching.

Protect your endpoints

The influx of IoT devices is drastically changing the enterprise landscape, increasing the number of endpoints exponentially. Additionally, the advent of remote working and bring your own device policies means increased risks as employees use public WiFi and connect personal devices to the network. At the same time, attackers are becoming more skilled at compromising endpoints and entrenching themselves into the machines that need to be protected.

With the increase of endpoints to secure, already limited IT resources are being stretched thinner. In fact, resource limitations, especially a shortage of trained IT personnel, are reaching critical mass. According to the SANS Institute, a staggering 77.3% of security incident response teams now have just five or fewer members.

Thanks to automation and intelligent technologies, which can monitor vast amounts of data in near real-time and put threats in the right context for faster response, protecting endpoints, despite limited resources, it is becoming easier.

Data-focused security solutions, such as OpenText™ Encase™, work quickly to block such threats as soon as they’re identified. The solutions also ensure backups for at-risk data and isolate data that hasn’t yet been threatened. After an incident, security information is analyzed to understand how a threat slipped past defenses. It then applies the lessons learned to strengthen data security, minimizing risk from future attacks using the same threat.

The right tools, such as EnCase, enable security teams to confidently and comprehensively respond to any cyberthreat, protecting your data in a zero-trust world and offering an Information Advantage.

Contact us to learn more about how OpenText helps organizations achieve better security and trust in today’s increasingly untrusting world.

This blog first appeared on CIO.com.

Share this post

Share this post to x. Share to linkedin. Mail to
OpenText avatar image

OpenText

OpenText, The Information Company, enables organizations to gain insight through market-leading information management solutions, powered by OpenText Cloud Editions.

See all posts

More from the author

Manutan combines digital services with the human touch to delight customers

Manutan combines digital services with the human touch to delight customers

At Manutan, we equip businesses and communities with the products and services they require to succeed. Headquartered in France, our company has three divisions, serving…

January 31, 2024 4 minutes read
Reaching new markets in Europe and beyond

Reaching new markets in Europe and beyond

How information management specialists at One Fox slashed time to market for innovative products with OpenText Cloud Platform Services At One Fox, we’ve driven some…

January 18, 2024 4 minutes read
SoluSoft helps government agencies tackle fraud faster

SoluSoft helps government agencies tackle fraud faster

Fraud, in all its forms, is a pervasive problem, spanning industries and preying on vulnerabilities in federal and state government systems. Each year in the…

November 21, 2023 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.