← Back to Resources
Articles

Data manipulation and responsibility

September 26, 2018 2 min read

It can be hard to definitively assess which industry is most affected by data breaches.  Some research, such as the 2017 Trustwave Global Security Report, points to retailers being the most compromised.  Others, like Citrix ShareFile using data from Ponemon, conclude that it’s the healthcare industry, which we’ve written about here on prior occasions.

Whoever is truly first doesn’t make a huge difference, however.  Coming in second or third doesn’t make the risk any less real.  Not when attackers use techniques both old and evolving to create havoc, oftentimes targeting organizations that remain stagnant in preparatory efforts.  Some, minimizing the impact of data security, still view the problem as squarely an IT one.  “Ultimately, it should be a part of the company culture and, as such, echoed in all procedures and policies,” says Paige Schaffer, president and COO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit.  Education and employee training are still lacking to the point where methods like spear phishing, in which employees are fooled into giving hackers access to their systems, account for 90% of cyberattacks.

Other forms of attack pose an even greater challenge for industries that can be famous for dragging their feet to meet them.  Data manipulation, for example, is an emerging threat aimed at falsifying legitimate data rather than actually stealing it.  What makes it particularly insidious is its ability to circumvent the traditional tools that detect stolen data, since it simply alters the data where it lies, rather than removing it.  You might not even notice it.  Stock market data or Air Force software could be compromised, and you would be none the wiser until it was too late.

Experts have been warning about this new type of attack since 2015, which makes it imperative to use new methods of stopping it.  As PJ Kirner at Dark Reading recommends, tools to monitor data integrity can send alerts when unauthorized changes occur.

Through all of this, it is also important to remember the customers who are actually affected by a breach.  Schaffer insists on companies providing real assistance to victims, like identity theft resolution services, to resolve any fraud issues as smoothly as possible.

No matter the entity, every sector is vulnerable to this sort of occurrence.  Responsibility for ensuring data is secure and monitored, and that customers are looked after, falls on the companies and agencies that handle the data.  It doesn’t take much research to know that.

 

By: Jonathan Weicher, post on September 26, 2018
Originally published at: http://www.netlibsecurity.com
Copyright: NetLib Security

Related Articles

Open Letter to Security Leaders: Let’s Discuss Our Strategy

David Stonehill, NetLib Security CTO, issued the following open letter: STAMFORD, Conn., March 23, 2026…

Press Release: Announcing Encryptionizer Winter 2026 Release and EKM Upgrade

NetLib Security Announces Winter 2026 Release with AI-Driven Enhancements and Major Upgrades to Encryptionizer Key…

2026 Is Here and Encryption Is No Longer Optional

NetLib Security announces the general availability of Encryptionizer Winter 2026 Release From the desk of…

Ready to protect your data?

Try Encryptionizer free — no commitment required.

NetLib Security
AI Assistant · Online
Hi! I'm the NetLib Security assistant. I can answer questions about our encryption solutions, HIPAA compliance, Encryptionizer, and more. How can I help you today?