Protecting your data in a zero-trust world

Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of…

OpenText Security Cloud Team profile picture
OpenText Security Cloud Team

August 28, 20194 minute read

Descriptive text explaining the contents of the image.

Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of online data individuals and organizations create every day.

The documentary begins with a simple question: set in a classroom, David Carroll, Associate Professor at Parsons School of Design asks his students, “Who has seen an advertisement that has convinced you that your microphone is listening to your conversations?”

The entire class raised their hands.

The reality, as Carroll goes on to say, is not necessarily that your devices are listening to your conversations but that your behavior is being accurately predicted through analytics. When you’re getting targeted advertisements for a product you want to purchase, this may not seem like a bad thing.

But according to CNBC, nearly all Americans can be re-identified based on only 15 pieces of anonymous data — presenting new security threats and potentially far-reaching consequences to both individuals and corporations.

Cybersecurity: Our greatest threat

Cybersecurity is increasingly becoming a part of the boardroom conversation and digital strategy to safeguard data – and with good reason. As a Clark School study at the University of Maryland reported, on average, hackers attack computers with internet access every 39 seconds.

Accenture reports that the cost of cybercrime to US Financial Services companies rose 40% between 2014 and 2017, costing companies an average of over $18 million per year. It’s clear that digital transformation has presented organizations with new challenges to cyber risk management.

And yet, many organizations still experience a disconnect between what organizations believe to be adequate cybersecurity, and what’s truly needed to keep your data safe.

So why is it so difficult to get cybersecurity right?

Protecting your endpoints

Every time you use your smartphone, laptop, tablet, or other smart device, you’re leaving a digital footprint. Whether you’re shopping online, surfing the web, or scrolling through your favorite social media platform, all your online interactions combine to create a digital profile that can be used to predict your behavior.

But it’s not just personal interactions that add to the complexity of cybersecurity. It’s estimated that by 2020, there will be 40 trillion gigabytes of data in existence. By 2025, there will be 80 billion devices connecting to the Internet of Things (IoT) — all generating vast amounts of information.

The influx of IoT devices will drastically change the enterprise landscape. And in the corporate world, where employees work remotely, use public WiFi, and connect personal devices to the network, the number of possible endpoints — and the associated security risks — continues to grow. On top of this, new research from the SANS Institute indicates that resource limitations are reaching critical mass — citing that a staggering 77.3% of security incident response teams are comprised of 5 members or less.

Without the right security tools to help your employees manage all these endpoints, your organization’s data could be at risk.

Join us at OpenText World to learn more

Attackers are becoming increasingly skilled at compromising endpoints and entrenching themselves into the machines organizations are trying to protect. With OpenText™ EnCase™ software, security teams can confidently and comprehensively respond to any cyber threat — both commodity and the targeted attacks.

At OpenText World 2020, you’ll learn about the latest software capabilities for OpenText™ EnCase™ programs, OpenText™ Axcelerate™, OpenText™ Magellan™, OpenText™ Insight, OpenText™ Covisint and more. We’ll explore how to protect your data in a zero-trust world, and why law enforcement, legal, and security professionals need to continuously augment and tune their skills.

Join us to learn, teach, and share while exploring the latest updates and best practices across the spectrum of information management, information security, eDiscovery, artificial intelligence, and forensic investigation. OpenText World takes place October 26-29 online.

Share this post

Share this post to x. Share to linkedin. Mail to
OpenText Security Cloud Team avatar image

OpenText Security Cloud Team

See all posts

More from the author

Dissecting IcedID behavior on an infected endpoint

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

4 minute read

Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

4 minute read

OpenText MxDR platform: a team player

OpenText MxDR platform: a team player

There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.