Protecting your data in a zero-trust world

Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of…

OpenText Security Cloud Team  profile picture
OpenText Security Cloud Team

August 28, 20194 min read

QR code and smartphone, new technologies. Electronic digital technologies scanning, barcode

Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of online data individuals and organizations create every day.

The documentary begins with a simple question: set in a classroom, David Carroll, Associate Professor at Parsons School of Design asks his students, “Who has seen an advertisement that has convinced you that your microphone is listening to your conversations?”

The entire class raised their hands.

The reality, as Carroll goes on to say, is not necessarily that your devices are listening to your conversations but that your behavior is being accurately predicted through analytics. When you’re getting targeted advertisements for a product you want to purchase, this may not seem like a bad thing.

But according to CNBC, nearly all Americans can be re-identified based on only 15 pieces of anonymous data — presenting new security threats and potentially far-reaching consequences to both individuals and corporations.

Cybersecurity: Our greatest threat

Cybersecurity is increasingly becoming a part of the boardroom conversation and digital strategy to safeguard data – and with good reason. As a Clark School study at the University of Maryland reported, on average, hackers attack computers with internet access every 39 seconds.

Accenture reports that the cost of cybercrime to US Financial Services companies rose 40% between 2014 and 2017, costing companies an average of over $18 million per year. It’s clear that digital transformation has presented organizations with new challenges to cyber risk management.

And yet, many organizations still experience a disconnect between what organizations believe to be adequate cybersecurity, and what’s truly needed to keep your data safe.

So why is it so difficult to get cybersecurity right?

Protecting your endpoints

Every time you use your smartphone, laptop, tablet, or other smart device, you’re leaving a digital footprint. Whether you’re shopping online, surfing the web, or scrolling through your favorite social media platform, all your online interactions combine to create a digital profile that can be used to predict your behavior.

But it’s not just personal interactions that add to the complexity of cybersecurity. It’s estimated that by 2020, there will be 40 trillion gigabytes of data in existence. By 2025, there will be 80 billion devices connecting to the Internet of Things (IoT) — all generating vast amounts of information.

The influx of IoT devices will drastically change the enterprise landscape. And in the corporate world, where employees work remotely, use public WiFi, and connect personal devices to the network, the number of possible endpoints — and the associated security risks — continues to grow. On top of this, new research from the SANS Institute indicates that resource limitations are reaching critical mass — citing that a staggering 77.3% of security incident response teams are comprised of 5 members or less.

Without the right security tools to help your employees manage all these endpoints, your organization’s data could be at risk.

Join us at OpenText World to learn more

Attackers are becoming increasingly skilled at compromising endpoints and entrenching themselves into the machines organizations are trying to protect. With OpenText™ EnCase™ software, security teams can confidently and comprehensively respond to any cyber threat — both commodity and the targeted attacks.

At OpenText World 2020, you’ll learn about the latest software capabilities for OpenText™ EnCase™ programs, OpenText™ Axcelerate™, OpenText™ Magellan™, OpenText™ Insight, OpenText™ Covisint and more. We’ll explore how to protect your data in a zero-trust world, and why law enforcement, legal, and security professionals need to continuously augment and tune their skills.

Join us to learn, teach, and share while exploring the latest updates and best practices across the spectrum of information management, information security, eDiscovery, artificial intelligence, and forensic investigation. OpenText World takes place October 26-29 online.

Share this post

Share this post to x. Share to linkedin. Mail to
OpenText Security Cloud Team avatar image

OpenText Security Cloud Team

See all posts

More from the author

AI Agents Are the New Attack Surface—Here’s How to Defend Against Them

AI Agents Are the New Attack Surface—Here’s How to Defend Against Them

Discover the five-step framework for securing AI agents before deployment. From data protection to incident response, here’s your roadmap to safe AI.

December 11, 2025

31 min read

Dissecting IcedID behavior on an infected endpoint

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023

4 min read

Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

November 03, 2022

4 min read

Stay in the loop!

Receive regular insights, updates, and resources—right in your inbox.