{"id":72801,"date":"2014-10-23T21:19:08","date_gmt":"2014-10-24T01:19:08","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-25T12:25:37","modified_gmt":"2021-08-25T16:25:37","slug":"avoid-a-data-breach","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/avoid-a-data-breach\/","title":{"rendered":"Avoid A Data Breach"},"content":{"rendered":"<p><a href=\"https:\/\/grayshelter.wordpress.com\/2014\/09\/18\/safeguards-against-hardware-theft-and-vandalism\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106896\" title=\"Avoid A Breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-5.jpg?resize=135%2C110&#038;ssl=1\" alt=\"Avoid A Data Breach\" width=\"135\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-5.jpg?resize=150%2C122&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-5.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-5.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 135px) 100vw, 135px\" \/><\/a>Security firm <a title=\"SRC Cyber\" href=\"https:\/\/www.srcinc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SRC Cyber<\/a> cites a report from the <a title=\"Government Accountability Office\" href=\"http:\/\/www.gao.gov\" target=\"_blank\" rel=\"homepage noopener noreferrer\">United States Government Accountability Office<\/a>, <a title=\"CYBERSECURITY National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented\" href=\"http:\/\/www.gao.gov\/assets\/660\/652170.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The U.S. Computer Emergency Readiness Team<\/a> (PDF) reported a <strong>782% increase in cyber incidents<\/strong> from 2006-2012. As this number increases, SRC Cyber and other <a title=\"Computer security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_security\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">cybersecurity<\/a> companies are pressured to respond. They are creating products that not only defend against threats but also aid in recovery if a data breach occurs.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106898\" title=\"Data breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach-1.jpg?resize=100%2C75&#038;ssl=1\" alt=\"Data breach\" width=\"100\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach-1.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach-1.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach-1.jpg?w=430&amp;ssl=1 430w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>SRC Cyber points out that <a title=\"Computer security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_security\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">security breaches<\/a> can happen to anyone at any time. The article claims that system problems and human error account for the majority of the data breaches. The most common single cause of data breaches at 42% is malicious intent.<\/p>\n<p>This SRC Cyber infographic shows the impact of three high-profile data breach attacks. The attacks have had an effect on security spending, attack awareness, and in the case of the <a title=\"BetaNews - Target security breach now worse than estimated\" href=\"http:\/\/betanews.com\/2014\/01\/11\/target-security-breach-is-even-worse-now-an-estimated-100-million-customers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Target breach<\/a> how it&#8217;s hit the company&#8217;s profits.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20161212120614\/http:\/\/www.srccyber.com:80\/news-and-events\/documentlibrary\/avoid-a-breach.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-106900\" title=\"Avoid a Breach Infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_src_cybersecurity.jpg?resize=400%2C930&#038;ssl=1\" alt=\"Avoid a Breach Infographic\" width=\"400\" height=\"930\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_src_cybersecurity.jpg?w=455&amp;ssl=1 455w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_src_cybersecurity.jpg?resize=32%2C75&amp;ssl=1 32w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_src_cybersecurity.jpg?resize=65%2C150&amp;ssl=1 65w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_src_cybersecurity.jpg?resize=440%2C1024&amp;ssl=1 440w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.zdnet.com\/on-cybersecurity-small-businesses-flirting-with-disaster-survey-finds-7000005891\/\" target=\"_blank\" rel=\"noopener noreferrer\">On cybersecurity, small businesses flirting with disaster, survey finds<\/a> (zdnet.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US-CERT predicts a 782% increase in cyber incidents from 2006-2012 the most common cause of a data breach is malicious intent at 42%.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2268,2262,125,2267,2049,676],"class_list":["post-72801","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-aurora","tag-cert","tag-data-breach","tag-src-cyber","tag-target","tag-washington-post"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/72801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=72801"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/72801\/revisions"}],"predecessor-version":[{"id":124493,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/72801\/revisions\/124493"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=72801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=72801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=72801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}