Social Media & The New Cybersecurity Paradigm

By

It’s easy to think of data breaches in terms of us and them.  

We picture the bad guys lurking outside our gates, looking for chinks in our armor (or firewalls in this case). In truth, when a breach occurs, it’s more likely that an employee left the gate unlatched.

A Harvard Business Review article points to the 2013 cyber attack on Target as a prime example of just how dangerous insiders can be. While the actual attackers were outsiders, they gained access to the retail giant’s systems through an insider, one of the company’s refrigeration vendors. The article also notes that at least 80 million insider attacks occur in the United States each year and their impact totals in the tens of billions of dollars a year.


What’s even more disturbing is that most of these attacks are preventable. The privacy and data-protection legal team at BakerHostetler said 36 percent of security breaches were the result of employee negligence. Another survey from CompTIA, the IT industry’s trade association, said human error is at the root cause of 52 percent of security breaches.

Companies of all sizes turn to technology to streamline operations. But the more employees and vendors that have access to a centralized system, the greater the risk for intentional and accidental breaches.

You may think that cybercriminals only target certain sectors. Healthcare and financial services are understandably targets for attack. Yet, according to the BakerHostetler Data Security Incident Response Report 2015 all industries are at risk of cyber attacks and only the frequency and severity differ.

Think of every company you do business with – your accountant, your coffee shop, your grocery store – they all use internal systems to house employee or customer data, such as social security or credit card numbers. To a smaller company, the ramifications of a breach can be even more costly than a large regulated organization. 

The BakerHostetler report said, “because incidents affecting these sectors often require forensic investigation and draw more media coverage, the cost and potential financial consequences are dramatically higher on a per-incident basis.”

Social media accounts are also exposed to risks from internal negligence. Furthermore the risk is magnified once a post goes viral. At that point, it’s impossible to contain and a company must activate damage control mode. That’s why many organizations are investing in software platforms that provide “social listening” capabilities. 

Social listening allows companies to monitor social conversations, flag inappropriate content and take action before it has a chance to escalate. Designing a solution that provides companies the ability to listen without compromising privacy is critical in the new cybersecurity paradigm. Paired with employee training, companies should focus on creating a wall of defense to protect valuable assets. 

When the odds say that a security breach will be caused by an internal source, organizations must do what they can to fortify the fortress from the inside out.

Is your company ready for the new cybersecurity paradigm?


Rohit Valia is the CEO & Founder of Cafyne. He was previously Program Director for Big Data Analytics at IBM. He is an experienced technology and marketing executive, with over 15 years of experience in enterprise datacenter technologies with hands on software development, product management and marketing experience in security, Java EE middleware, virtualization and cloud computing. Before joining IBM Platform Computing, he was the Director for Sun Microsystems cloud services business unit and then the head of Oracle University marketing. He has been a speaker at numerous JavaONE and other technical conferences and published papers in IEEE and other journals. He is also the author of two U.S. Patents related to Java co-processors and disconnected web client operations. 




Edited by Stefania Viscusi
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

ChatGPT Isn't Really AI: Here's Why

By: Contributing Writer    4/17/2024

ChatGPT is the biggest talking point in the world of AI, but is it actually artificial intelligence? Click here to find out the truth behind ChatGPT.

Read More

Revolutionizing Home Energy Management: The Partnership of Hub Controls and Four Square/TRE

By: Reece Loftus    4/16/2024

Through a recently announced partnership with manufacturer Four Square/TRE, Hub Controls is set to redefine the landscape of home energy management in…

Read More

4 Benefits of Time Tracking Software for Small Businesses

By: Contributing Writer    4/16/2024

Time tracking is invaluable for every business's success. It ensures teams and time are well managed. While you can do manual time tracking, it's time…

Read More

How the Terraform Registry Helps DevOps Teams Increase Efficiency

By: Contributing Writer    4/16/2024

A key component to HashiCorp's Terraform infrastructure-as-code (IaC) ecosystem, the Terraform Registry made it to the news in late 2023 when changes …

Read More

Nightmares, No More: New CanineAlert Device for Service Dogs Helps Reduce PTSD for Owners, Particularly Veterans

By: Alex Passett    4/11/2024

Canine Companions, a nonprofit organization that transforms the lives of veterans (and others) suffering PTSD with vigilant service dogs, has debuted …

Read More