3 threats dirty data poses to the enterprise
- by 7wData
Data drives the modern enterprise. From making product and service recommendations based on past consumer choices to determining market opportunities and business risks to testing how a product or service will perform, data is embedded into almost every enterprise decision, interaction and process.
It's nearly impossible to assure integrity and quality of data in real time, however. In fact, most organizations believe a third of their data is inaccurate in some way. This dirty data disrupts businesses and makes data a dangerous weapon for attackers to target and exploit.
The Information Security Forum (ISF) predicted dirty data will be the catalyst for the following emerging cybersecurity concerns by 2024. 1. Attackers will get good at poisoning data In a bid to improve their success rates and evade law enforcement, attackers continue to experiment with new techniques and launch stealthier, more targeted attacks. Threat actors actively look for disinformation so they can damage the reputation of an entity, mislead consumers or influence the outcome of an event. ISF predicted threat actors will shift their attention toward illicit data manipulation to compromise the accuracy and credibility of information, thus puncturing the integrity of the data organizations use to drive their businesses forward. Cyber fusion centers are intradepartmental collaborative efforts designed to shoulder the responsibility of cybersecurity by facilitating communication between different teams. Fusion centers integrate automation tools and curate data from various sources to find insights that guide decision-making. ISF predicted attackers will exploit the influence cyber fusion centers have over business operations. Attackers will use misinformation and data distortion to cause security teams to chase and react to false events and intelligence data, inadvertently disrupting the businesses they are trying to protect. A digital twin is a digital replica of a physical thing, such as a wind turbine or a jet engine, that uses simulation and machine learning to collect data points based on real-world behaviors. Manufacturers are accelerating the adoption of digital twins to optimize product development, enhance tracking capabilities and predict business outcomes. Since digital twins employ real-world data, anyone with access to the twin can see critical information about its physical counterpart. Attackers can use vulnerabilities in digital twins and other techniques, such as data subversion, to prolong manufacturing and supply chain downtime. Attackers' efforts can be further assisted by poor defenses, internal network issues and inherent weaknesses in industrial control systems (ICSes), operational technology (OT) and IoT systems hardware.
[Social9_Share class=”s9-widget-wrapper”]
Upcoming Events
Shift Difficult Problems Left with Graph Analysis on Streaming Data
29 April 2024
12 PM ET – 1 PM ET
Read MoreYou Might Be Interested In
Australia finally has mandatory data breach nofitication
17 Feb, 2017Australia will have a mandatory data breach notification scheme in place within the year after several aborted attempts, following the …
Why AI Will Shift Decision-Making From the C-Suite to the Frontline
12 Aug, 2018AI technologies can provide managers and employees with accurate data and predictions at their fingertips to support and enable the …
Cyber Security Challenges in Healthcare IoT Devices
25 Jun, 2019The recent Vectra 2019 Spotlight Report on Healthcare indicates that the proliferation of healthcare internet-of-things (IoT) devices, along with a …
Recent Jobs
Do You Want to Share Your Story?
Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.