It was a CIO's worst nightmare. In October, an "old-school" cyberattack — distributed denial of service — took down prominent websites including Netflix and Twitter.
However, unlike previous attacks, this one took a new approach: hacking thousands of consumers' internet-connected devices. In this new age of cyberattacks, web-connected devices like DVRs, appliances and cameras have now become more than consumer goods, they have become weapons.
If we have learned one thing about security in the age of smart, connected devices it is that no one is immune to data breaches. Security is an ongoing concern with anyone leveraging IoT technology in their operations. Every additional device or connection opens up another possible point of entry for real users and also for those with malicious intent.
Health care organizations are especially vulnerable. In 2015, three of the seven largest data breaches on record were health care related, with the Anthem breach taking the top spot overall, affecting nearly 80 million people and costing an estimated $37 billion.
Financial and payment systems also are at risk. Target's payment terminal breaches affected hundreds of thousands of dissatisfied customers and forced the company to spend millions of dollars on technology upgrades.
Cyber criminals are increasingly targeting any company with access to lucrative personal data like Social Security numbers, birth dates, e-mail addresses, payment histories or medical records. Home networks also can be hacked through poorly secured IoT devices (such as connected light bulbs), but the risks are limited to the individual.
That is not the case for large organizations. As dozens of firms already have experienced, data breaches and cyberattacks are more than just a security problem. A data breach can have long-term detrimental effects to your business in terms of shareholder confidence and corporate reputation.
Now that several major retailers and health care organizations have come forward as victims of cyberattacks, other organizations need to take a close look at their own security practices and networks to mitigate security risks where they can.