{"id":507,"date":"2021-08-09T13:09:49","date_gmt":"2021-08-09T07:39:49","guid":{"rendered":"https:\/\/tech9labs.com\/blog\/?p=507"},"modified":"2021-08-09T13:10:58","modified_gmt":"2021-08-09T07:40:58","slug":"8_data_security_trends_organizations_are_facing_in_2021","status":"publish","type":"post","link":"https:\/\/tech9labs.com\/blog\/2021\/08\/09\/8_data_security_trends_organizations_are_facing_in_2021\/","title":{"rendered":"8 data security trends Organizations are facing in 2021"},"content":{"rendered":"<h3 class=\"wp-block-heading\"><strong>1. Remote work is the top concern.\u202f<\/strong>\u00a0<\/h3><p>The report recommends that companies institute &#8220;a formal remote work policy and by adopting the right software tools that ensure company data is safe when accessed remotely&#8221; to prevent attacks.\u00a0<\/p><h3 class=\"wp-block-heading\"><strong>2. Data breaches are four times more common for companies that allow access to company data.\u202f<\/strong>\u00a0<\/h3><p>Employees should only access data that is critical to their job performance, to prevent cyber attacks &#8220;caused both by malicious data theft and accidental data loss.&#8221; The companies that do allow full access to company data are more likely to report a data breach (50.7% of breaches reported) as opposed to those that limit data access (12.6%).\u00a0<\/p><h3 class=\"wp-block-heading\"><strong>3. Data classification alone is not sufficient.<\/strong>\u00a0<\/h3><p>Categorizing data as public, internal, and confidential are frequently used by companies (82%), but &#8220;these programs alone have proved insufficient to restrict access and prevent data\u00a0breaches,&#8221;.The\u00a0majority of companies (62%) are still offering employees access to data that they don&#8217;t need\u2014and these companies are reportedly 2.5 times more likely to experience a data breach. Data access controls and authentication should be the top priorities.\u00a0<\/p><h3 class=\"wp-block-heading\">4. <strong>Phishing schemes are spiking and becoming more harmful.<\/strong>\u00a0<\/h3><p>&#8220;80% of employees report receiving phishing emails, compared to 73% in 2019, and employees are 15% more likely to click on a malicious link.&#8221; In particular, marketing employees were the most likely (38%) to click on these malicious links.&nbsp;<\/p><h3 class=\"wp-block-heading\"><strong>5. A third of employees are hit by account takeovers.<\/strong>\u00a0<\/h3><p>While account takeovers are nothing new, COVID-19 has resulted in a bump of online transactions. &#8220;From 2018 to 2019, TransUnion\u202freported\u202fa\u00a0347% increase in account takeovers targeting online retail customers. And increased reliance on e-commerce will only make things worse,&#8221; the report states.\u202f\u00a0<\/p><h3 class=\"wp-block-heading\"><strong>6. Improved authentication methods.<\/strong>&nbsp;<\/h3><p>The use of two-factor authentication went up 18% and is used by 82% of businesses in 2020. And the use and biometric data security\u2014such as the use of fingerprints and facial recognition\u2014went from 27% in 2019 to 53% in 2020.\u00a0<\/p><h3 class=\"wp-block-heading\"><strong>7. Ransomware affected 28% of businesses.<\/strong>\u202f&nbsp;<\/h3><p>Over the last 12 months, nearly a third of businesses were hit with ransomware\u2014of this group, 75% paid. Still, only 70% of those could retrieve their data.\u202f&nbsp;<\/p><h3 class=\"wp-block-heading\"><strong>8. VR\/AR use nearly triples.<\/strong>&nbsp;<\/h3><p>In 2020, 17% of businesses harness AR and VR for training purposes\u2014and digital marketing and accounting report even greater use of these tools, up to 35%. Training has moved from the physical to the virtual, and more employees, 71%, are reporting that they must attend security training annually.&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>1. Remote work is the top concern.\u202f\u00a0 The report recommends that companies institute &#8220;a formal remote work policy and by adopting the right software tools that ensure company data is&#8230;<\/p>\n","protected":false},"author":1,"featured_media":508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[],"class_list":["post-507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/posts\/507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/comments?post=507"}],"version-history":[{"count":2,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/posts\/507\/revisions"}],"predecessor-version":[{"id":511,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/posts\/507\/revisions\/511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/media\/508"}],"wp:attachment":[{"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/media?parent=507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/categories?post=507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech9labs.com\/blog\/wp-json\/wp\/v2\/tags?post=507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}