I recently attended a training session where the presenter asked the audience, “Would you spend a year locked in your garage for $1 million?”
It made me think. Would being cooped up in my garage for 12 long months be worth a million dollar payday? Some would believe that’s a small sacrifice for a huge payout.
Translate that question to cyber crime: Is stealing valuable data worth the risk of a few years of probation or jail-time? The scary thing is, for many up-and-coming computer hackers out there, the answer is yes.
Data Compromise is a growing epidemic worldwide because it’s big business. Why take the risk of robbing a bank with a gun and a Nixon mask, when you can do it from an internet café with a warm cup of coffee?
One of the most infamous computer hackers to date, Albert Gonzalez masterminded the theft of more than 170 million credit card and ATM numbers from 2005 to 2007. He and his crew used SQL injection techniques to infiltrate internal corporate networks. Some of his biggest targets were TJ Maxx, Dave & Busters, and Heartland Payment Systems. The total in losses to those companies and others range in the hundreds of millions of dollars. Last year alone, $114 billion dollars was lost in 24 countries due to cyber crime.
Credit card numbers and bank accounts aren’t the only loot these criminals are after. Personal information, medical records, and social security numbers are being compromised daily. For an eye-opener, check out The Data Breach Blog. Notice how many reports were posted in just the past week?
When it comes to data compromise, many experts think it’s not a matter of if it will happen – it’s a matter of when. No matter how high we build our wall, cyber criminals seem to have a taller ladder.
The solution? Focus on securing the data rather than the device. Encryption technology increases your data’s security, decreases internal and external vulnerabilities and minimizes impact on operations. With it you can quickly establish and enforce policies governing encryption applications on all mobile endpoints, including laptops, desktops, handhelds and other external media.
That way, if hackers do find their way in, they won’t find anything useful.
If you’re worried about your company’s name being the next headline, give us a call. LANDesk can help.