Identity data turning toxic for big companies. Wait but how?

Identity data

Identity data turning toxic for big companies. Wait but how? Google might be in trouble for collecting the personal data of its users, but many companies have a growing incentive to rid their hands of the data that users entrust them with. This is because of growing costs of holding onto it.

Identity data

A major cause is the rising number of cyber-attacks where hackers steal the identity data held by companies, often to sell them on to various black markets. Take the recent example of US giant Equifax, one of the top three companies in the consumer credit reporting industry. It chalked up other 2.5m identity-theft casualties to its existing toll of 143m in October 2017. The firm has suffered a steady stream of identity data

loss following a cyber-attack that took place in May this year, where hackers capitalized on weaknesses in its software.

The security breach – as a primary cause – resulted in around US$4.8 billion being wiped off Equifax’s market value from May to September 2017. It also tarnished its image and cost the firm’s longstanding CEO his job.

The Equifax data breach is just the tip of the iceberg. The latest Breach Level Index (BLI) published by digital security company Gemalto shows a mounting figure of around 9.2 billion data-record losses since 2013. The BLI also reports that only a meager 368m out of the 9.2 billion stolen records were concealed from potential hackers through the use of data-encoding technology.

The rate at which valuable identity data is flying out of the control of firms is alarming – more than 3,500 records per minute. Around 23% of the top data-breaches over the past five years contained consumers’ identity data – like names, dates-of-birth, addresses and account passwords. Corporate victims include big names such as Yahoo, eBay, and JP Morgan Chase.

The volume and sophistication of these cyber-assaults will make top-level executives of firms that hold sensitive identity data anxious about its safe-keeping.

Growing cost of regulation

As well as cyber-attacks, companies are having to contend with growing levels of regulation. As well as the regulations of the jurisdiction they are based in, when firms are spread across nations, they must also abide by international standards.

The costs of this compliance in the banking sector are increasing at an alarming rate. One report has found that banks spent nearly US$100 billion on compliance in 2016 and the global spending on meeting the regulatory requirements increased from 15% to 25% over the previous four years. This skyrocketing spend on compliance leaves little room for product development.

It has now become imperative for companies holding information on EU citizens to implement control mechanisms to protect personal data in accordance with the EU’s strict General Data Protection Regulation (GDPR) guidelines. GDPR, in essence, is about enhancing existing privacy protection. It will be enforced from May 25, 2018.

Non-compliance with GDPR may lead to fines to the tune of €20m or 4% of a firm’s global annual sales figure – whichever is greater. Already, implementing the necessary steps to adhere to the new regulation is proving to be expensive for organizations – especially firms with diverse and intertwined business portfolios.

Some estimates predict that purchasing the technology to adhere to the GDPR standards and avoid paying the exorbitant fines will cost Fortune 500 companies on average US$1m each. Add to this the costs of permanent staffing and legal advice for this compliance, you get the picture of overall spending required for one set of regulatory standards. Clearly, the price of such compliance will compel large organizations to explore the burgeoning market of cost-effective and innovative regulatory technology.

A logical solution?

At the point where the cost of protecting identity assets outweighs the benefit of storing it, it becomes toxic to the organization. As with any risk, companies must act to mitigate or remove it – in this case, breach of identity data. When similar risks emerged around the processes for securing payment card processing, solutions focused on tokenization of card information within an organization to minimize handling of clear text credit card numbers. It is hard to see how a similar approach could be applied to a multifaceted entity such as identity.

However, there is a potential in the application of decentralized technologies that have emerged from the development of cryptocurrencies such as Bitcoin. In these model’s people could choose whether a centralized entity – such as a bank, for example – would manage their identity or whether they could manage it themselves. Models for a decentralized identity are emerging with parallel developments in the creation of a decentralized web.

There are a number of challenges for both private individuals and the traditional identity provider to overcome for this move to become a reality – including wider adoption of peer-to-peer trust models. But it seems increasingly possible that the cost of cyber-attacks, together with regulatory compliance, could be the nudge that drives organizations to surrender their control over vast pools of identity data.

Most Popular Training Courses at Indian Cyber Security Solutions

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Tester Training

Ethical Hacking  training

Python Programming training

 RHCE  training

CEH V9  training

Diploma in Network Security Training

Secure Coding in Java

Diploma in Web Application Security 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advanced Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 

Digital marketing

CCNA training

Android Training

Leave a Reply

Your email address will not be published. Required fields are marked *



Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× Hi How can we help you