During the peak of the 2016 U.S. presidential election cycle, two groups of hackers accessed the Democratic National Convention servers. The leak made public emails detailing the DNC's interactions with the media, both primary candidates’ campaigns and campaign contributions, and personal information about DNC donors, including credit card and Social Security numbers. This historical breach will forever be known for its impact on the 2016 Presidential election.
Recently, we’ve seen the frequency of breaches like the DNC attack skyrocket—and no organization is safe. Over the past two years, sixty-six percent of organizations report experiencing five or more breaches, according to a commissioned study conducted by Forrester on behalf of Centrify. In the current threatscape, we can no longer rely on the traditional boundaries of data security.
Emerging technologies allow more devices, apps, and people to use online networks than ever before. In fact, by 2020:
- More than twice as many people will be online -- about four billion.
- Fifty billion devices will connect to the Internet.
- Online data volume will increase by 50 times.
These trends and technology are expanding enterprise networks and making them much more difficult to secure. Increased cloud usage, a remote workforce, and the exponential growth of IoT, among other factors, all contribute to the de-perimeterization of enterprise networks. This growing attack surface sets the stage for cyber criminals to infiltrate more data, more often, than ever before. In the past two years, two-thirds of companies experienced an average of five or more data breaches.
In the absence of traditional “safe” and “unsafe” sides of our networks, modern enterprises face a new reality: today’s security is no longer secure and stopping breaches requires immediate action.
Minimizing an organization’s attack surface as its network continues to expand requires a paradigm shift when it comes to security strategy. Our free eBook, Rethink Security: A Massive Paradigm Shift in the Age of Access, details the new cyber security landscape and, more importantly, explains how to keep your company’s information safe.
This is written by the individual author in his/her personal capacity, and the opinions, views and/or thoughts expressed herein are solely the author’s own. They are not intended to and may not necessarily reflect the official policy or position, or the opinions or views of ThycoticCentrify or its affiliates, employees, or any other group or individual.