SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Top 10 Security Trends in 2012
It was not business as usual in 2011. Some of the world’s
largest corporations were hacked, breached and cyber
attacked. What does this spell for 2012?




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   2
1. More Hacking
Whether they’re bored teenagers, government spies,
corporate saboteurs or hacktivists, expect more hackers in
2012. Sadly, the vulnerabilities of 2011 are far from fixed.




January 2012      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   3
2. Human Error
How do many of these hack attacks happen? People make
mistakes. Simple as that. Click a spam email, it leads to a
Trojan horse, and there goes the network. It happens that
easily. Without proper employee training, it will continue.




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   4
3. Data Breach Insurance
The business response to all these hacker attacks?
Minimize risk. Cyber liability policies will take off in 2012 as
the last, but necessary, line of defense.




January 2012       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   5
4. Extra Pieces of Pii
Once upon a time, personally identifiable information, or
Pii, was your Social Security number, birth date and
mother’s maiden name. Now, thanks to breaches like those
at Sony and Epsilon, the definition is expanding to include
email addresses, passwords and PINs.




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   6
5. Privacy Planning
As the definition of privacyexpands, so will the ways
businesses handle personal information. More companies
will follow Privacy by Design, that is, build security into their
products and services at the developmental stage instead
of waiting for a government mandate.




January 2012       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   7
6. Cracking Down
The Federal Trade Commission took on Facebook in 2011
for “unfair and deceptive” handling of user information.
Look for the FTC to continue its hard stance against
companies that play fast and loose with consumer data.




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   8
7. Redefining ‘Security’
Watch the definition of “security” change in 2012.
Government agencies, Congress, the courts and the media
all will seek to figure out what is reasonable protection
when it comes to the corporate handling of personal data.




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   9
8. Breach Notification Laws
New breach notification laws surely will be seen in parts of
the Western Hemisphere this year. Germany passed a law
requiring breach notification in 2010, and many of
Germany’s neighbors are considering it, as is Canada. But
what about the U.S.? Unlikely.




January 2012       © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   10
9. Cloud Security Concerns
As more computers, devices and users migrate to the
cloud–storing files and running applications on the web–
expect more talk of cloud security. Especially since the
cloud isn’t governed by the outdated Electronic
Communications Privacy Act, which establishes what kind
of information government and police agencies can access,
and how.




January 2012     © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   11
10. Social Media Attacks
Social media accounts are as vulnerable as the cloud. Just
ask Lady Gaga, whose little monsters were recently duped
into signing up for a Gaga edition iPad. The rub: Information
simply went to a social-media-savvy conman. We’ll see more
attacks on individual and corporate social media accounts,
for sure.




January 2012      © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential   12

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Black berry link installation readme
Black berry link installation readmeBlack berry link installation readme
Black berry link installation readme
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Identity theft
Identity theftIdentity theft
Identity theft
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Seminar
SeminarSeminar
Seminar
 
Email Compromise in Business
Email Compromise in BusinessEmail Compromise in Business
Email Compromise in Business
 
Phishing
PhishingPhishing
Phishing
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5Websites: 10 Things to Consider to Avoid Litigation 3-5
Websites: 10 Things to Consider to Avoid Litigation 3-5
 
2016 legal seminar for credit professionals
2016 legal seminar for credit professionals2016 legal seminar for credit professionals
2016 legal seminar for credit professionals
 

Andere mochten auch

Merry Christmas
 Merry Christmas     Merry Christmas
Merry Christmas Makala (D)
 
Seduction Roses
Seduction RosesSeduction Roses
Seduction RosesMakala (D)
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Makala (D)
 
Respiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateRespiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateGreg Peters
 
CASE STUDY: How a Major Television Network Cut Printing Costs
CASE STUDY: How a Major Television Network Cut Printing CostsCASE STUDY: How a Major Television Network Cut Printing Costs
CASE STUDY: How a Major Television Network Cut Printing CostsPlus Technologies
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for studentsNnoffie Khaa
 
Project presentation
Project presentationProject presentation
Project presentationdunny205
 
Free and open source software
Free and open source softwareFree and open source software
Free and open source softwareAmit Bshwas
 

Andere mochten auch (20)

Full action
Full action Full action
Full action
 
Merry Christmas
 Merry Christmas     Merry Christmas
Merry Christmas
 
Seduction Roses
Seduction RosesSeduction Roses
Seduction Roses
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
How to-use-jing
How to-use-jingHow to-use-jing
How to-use-jing
 
Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)Face in the Crowd (Photographer R. Ramsey)
Face in the Crowd (Photographer R. Ramsey)
 
Calendario barrial
Calendario barrialCalendario barrial
Calendario barrial
 
Respiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an updateRespiratory Therapy Lab gets an update
Respiratory Therapy Lab gets an update
 
CASE STUDY: How a Major Television Network Cut Printing Costs
CASE STUDY: How a Major Television Network Cut Printing CostsCASE STUDY: How a Major Television Network Cut Printing Costs
CASE STUDY: How a Major Television Network Cut Printing Costs
 
Digipak presentation
Digipak presentationDigipak presentation
Digipak presentation
 
Black
BlackBlack
Black
 
Exp4
Exp4Exp4
Exp4
 
Read smarter, not harder
Read smarter, not harderRead smarter, not harder
Read smarter, not harder
 
General Datacomm
General DatacommGeneral Datacomm
General Datacomm
 
Ultra solutions
Ultra solutionsUltra solutions
Ultra solutions
 
FunnyFace
FunnyFaceFunnyFace
FunnyFace
 
Motivasi for students
Motivasi for studentsMotivasi for students
Motivasi for students
 
Project presentation
Project presentationProject presentation
Project presentation
 
Open Craft Lab
Open Craft LabOpen Craft Lab
Open Craft Lab
 
Free and open source software
Free and open source softwareFree and open source software
Free and open source software
 

Ähnlich wie Top 10 Security Trends of 2012

Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012Ayu Anita
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Gradytomo006
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's PresentationMediabistro
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
Chapter 11 – According to the authors, privacy and security go.docx
Chapter 11 – According to the authors, privacy and security go.docxChapter 11 – According to the authors, privacy and security go.docx
Chapter 11 – According to the authors, privacy and security go.docxbartholomeocoombs
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016James_08
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Jason Fernandes
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013Karim Shaikh
 
Information Security in the Age of Wikileaks
Information Security in the Age of WikileaksInformation Security in the Age of Wikileaks
Information Security in the Age of Wikileaksdbarton944
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxmarilucorr
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 kedsliemichal
 
Read Chapter 11 – According to the authors, privacy and securi.docx
Read Chapter 11 – According to the authors, privacy and securi.docxRead Chapter 11 – According to the authors, privacy and securi.docx
Read Chapter 11 – According to the authors, privacy and securi.docxdanas19
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Chapter 11 – According to the authors, privacy and security go h.docx
Chapter 11 – According to the authors, privacy and security go h.docxChapter 11 – According to the authors, privacy and security go h.docx
Chapter 11 – According to the authors, privacy and security go h.docxbartholomeocoombs
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxbartholomeocoombs
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 

Ähnlich wie Top 10 Security Trends of 2012 (20)

Ppt3 copy
Ppt3  copyPpt3  copy
Ppt3 copy
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Noah Lang's Presentation
Noah Lang's PresentationNoah Lang's Presentation
Noah Lang's Presentation
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Chapter 11 – According to the authors, privacy and security go.docx
Chapter 11 – According to the authors, privacy and security go.docxChapter 11 – According to the authors, privacy and security go.docx
Chapter 11 – According to the authors, privacy and security go.docx
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
Internet security threat report 2013
Internet security threat report 2013Internet security threat report 2013
Internet security threat report 2013
 
Information Security in the Age of Wikileaks
Information Security in the Age of WikileaksInformation Security in the Age of Wikileaks
Information Security in the Age of Wikileaks
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
 
Read Chapter 11 – According to the authors, privacy and securi.docx
Read Chapter 11 – According to the authors, privacy and securi.docxRead Chapter 11 – According to the authors, privacy and securi.docx
Read Chapter 11 – According to the authors, privacy and securi.docx
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Chapter 11 – According to the authors, privacy and security go h.docx
Chapter 11 – According to the authors, privacy and security go h.docxChapter 11 – According to the authors, privacy and security go h.docx
Chapter 11 – According to the authors, privacy and security go h.docx
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docx
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 

Kürzlich hochgeladen

Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Kürzlich hochgeladen (14)

Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 

Top 10 Security Trends of 2012

  • 1. Top 10 Security Trends in 2012
  • 2. It was not business as usual in 2011. Some of the world’s largest corporations were hacked, breached and cyber attacked. What does this spell for 2012? January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 2
  • 3. 1. More Hacking Whether they’re bored teenagers, government spies, corporate saboteurs or hacktivists, expect more hackers in 2012. Sadly, the vulnerabilities of 2011 are far from fixed. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 3
  • 4. 2. Human Error How do many of these hack attacks happen? People make mistakes. Simple as that. Click a spam email, it leads to a Trojan horse, and there goes the network. It happens that easily. Without proper employee training, it will continue. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 4
  • 5. 3. Data Breach Insurance The business response to all these hacker attacks? Minimize risk. Cyber liability policies will take off in 2012 as the last, but necessary, line of defense. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 5
  • 6. 4. Extra Pieces of Pii Once upon a time, personally identifiable information, or Pii, was your Social Security number, birth date and mother’s maiden name. Now, thanks to breaches like those at Sony and Epsilon, the definition is expanding to include email addresses, passwords and PINs. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 6
  • 7. 5. Privacy Planning As the definition of privacyexpands, so will the ways businesses handle personal information. More companies will follow Privacy by Design, that is, build security into their products and services at the developmental stage instead of waiting for a government mandate. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 7
  • 8. 6. Cracking Down The Federal Trade Commission took on Facebook in 2011 for “unfair and deceptive” handling of user information. Look for the FTC to continue its hard stance against companies that play fast and loose with consumer data. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 8
  • 9. 7. Redefining ‘Security’ Watch the definition of “security” change in 2012. Government agencies, Congress, the courts and the media all will seek to figure out what is reasonable protection when it comes to the corporate handling of personal data. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 9
  • 10. 8. Breach Notification Laws New breach notification laws surely will be seen in parts of the Western Hemisphere this year. Germany passed a law requiring breach notification in 2010, and many of Germany’s neighbors are considering it, as is Canada. But what about the U.S.? Unlikely. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 10
  • 11. 9. Cloud Security Concerns As more computers, devices and users migrate to the cloud–storing files and running applications on the web– expect more talk of cloud security. Especially since the cloud isn’t governed by the outdated Electronic Communications Privacy Act, which establishes what kind of information government and police agencies can access, and how. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 11
  • 12. 10. Social Media Attacks Social media accounts are as vulnerable as the cloud. Just ask Lady Gaga, whose little monsters were recently duped into signing up for a Gaga edition iPad. The rub: Information simply went to a social-media-savvy conman. We’ll see more attacks on individual and corporate social media accounts, for sure. January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 12