Data breach responses
Given the scale and speed of technological advances in recent decades, companies are generating more sensitive business data than ever. Though they are storing that data in ways that are beneficial to their businesses, they are also becoming more attractive targets for malicious actors.
“While legislators can only hope to keep pace with malicious actors, companies must uphold their end of the bargain. This requires companies to maintain and test their own data breach response plan.”
IOT devices will create a treasure trove of data for cyber criminals. Embarrassing and expensive breaches in the coming years are inevitable as there is no such thing as the perfect cyber defense. What companies can control, however, is their breach response.