“A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations or intellectual property. Most data breaches involve overexposed and vulnerable unstructured data — files, documents, and sensitive information.” — Wikipedia

“A data breach is a catchall term — it refers to any scenario in which your customer’s data might have been exposed. Here are some examples that show just how many different things can be called a data breach:

  • When sending an email, an employee accidentally attaches a document that contains personal data.
  • A hacker breaks into a business’s network and downloads point-of-sale data.
  • A healthcare employee sends patient data using a non-encrypted email.
  • Malicious software (aka malware) spreads to a business’s servers and steals private data.
  • An employee downloads a business file to their thumb drive and opens it on their un-secure home network.
  • A problem with a company’s web hosting software causes financial data to be exposed online.
  • Thieves break into your office and steal a laptop, which contains company data.

In each of these cases, data might have been exposed. You’ll notice how few of these examples involve hackers. In fact, only 42 percent of data breaches are caused by hackers or criminals. Thirty percent are caused by human error (like the employee who emailed the wrong document), and 29 percent are caused by system glitches (like the web host error).

Identity theft occurs after a data breach. Identity theft happens when cyber criminals use stolen data to make purchases, apply for loans, withdraw money, or commit fraud. If a data breach is the moment you lose data, then identity theft is the moment criminals use that data for malicious purposes.

It’s worth emphasizing that not all data breaches lead to identity theft. As we saw above, some breaches occur because of a lapse in security.” — Techinsurance

I’ve had my identity stolen once several years ago. My bank notified me of suspicious activity on my account. The thief spent thousands of dollars of my hard earned money. I have no clue HOW it happened, just that it DID happen. A claim was filed and I was later reimbursed. That was the end of it. Others aren’t so lucky.

“If you catch bogus transactions in one of your existing accounts, would you believe it if we said you’re in luck? That’s because you’re more likely to spend less than a day clearing up this type of identity theft. And you’re less likely to face financial and legal problems stemming from the theft. But if your identity was used to open several new accounts, get medical care, apply for a job or rent an apartment, you could spend 40-plus hours over the course of six months sorting out the fraud.” — Lifelock

“By incorporating the best aspects of cryptography, blockchain allows for the creation of an immutable, decentralized ledger that could finally spell the end of data breaches.

Immutability and decentralization combine to create a network of trust where all consumers and merchants are treated equally. Best of all, only an individual has access to his or her information — a principle known as zero-knowledge storage.

Blockchain delivers the full range of weaponry required to tackle data breaches: zero-knowledge storage, encryption, privacy, security and trust. The possibilities for personal and financial data are immense.

Imagine, for example, an online world that didn’t require a separate username and password combination for every e-commerce account. Operating within this sort of secure environment, you would not only be more confident in the privacy and security of your data, but also more willing to transact online.

Harnessing the strength of the blockchain, it’s entirely possible that the data breaches we know today could become a thing of the past very soon. This would be a new digital era, where individuals could control their data and personal transactions would be truly private and secure — and where businesses would not have to deal with the expensive headache of storing and protecting sensitive consumer data. The blockchain could create a revolution for everyone involved in digital transactions.” — ITproportal

There are Cryptocurrency start-ups in every industry that are building decentralized platforms that could negate potential data theft. Health care is number one of the top five industries at risk of data breaches according to Ekransystem.

“Patientory is a cybersecurity blockchain-based distributed application that provides users access to their health data. Think of us as a bridge that connects siloed, centralized medical and health record keeping systems. We create smart contracts that can be executed in relation to the medical and patient care continuum cycle.

Patientory empowers patients, clinicians, and healthcare organizations to access, store and transfer information safely, thus improving care coordination while ensuring data security. We’re the leading provider of dApp blockchain solutions for healthcare. Patientory uses blockchain technology to ensure end-to-end encryption while adhering to regulatory guidelines and compliance requirements.” — Patientory

When something leaves the world, something new is born! Web 2.0 is soon going to be replaced with its smarter sibling i.e. Web 3.0; overcoming the issues of security and privacy.

Instead of insecure databases and opaque data sharing practices, Web 3.0 will return control to the users which mean they will be able to access data from anywhere; mainly being driven by cloud applications and smart-phones. Apart from security, personalization is another add-on!

Web 3.0 can be rightly said as an intelligent web!

It is all about the evolution of third generation internet services that is a blend of Semantic web, Micro-formats, Artificial Intelligence, Data Mining, Natural Language Search and Machine Learning technologies.

Experts say that Web 3.0 is a data-driven and semantic web. The user will type a query on the web; the web will understand the context and essentially will meet the needs of the user.

So, if you perform more searches related to travel destinations, you’ll receive more ads related to the travel places. Also when you search for the cheap tickets, the search engine will keep in mind about the previous search and show you the results combining “travel destination and cheap tickets”.

So, the next gen search engine will not only search for the matching keywords but also perform the context search based on user’s behavior and preference.” — Hackernoon

“At the end of March 2018, a blockchain foundation called Nebulas IO launched its Mainnet and its native cryptocurrency NAS. The project, also known as the “Google of blockchains”, mainly provides a search engine for decentralized Apps and blockchains. It earned a lot of attention over the past few months, due to the fact that the founders of Nebulas are also the founders of the chinese cryptocurrency Antshares, later rebranded to NEO, (currently rank 11 on Coinmarketcap).

The Nebulas blockchain can be considered as unique in many ways. Instead of using existing consensus mechanisms like Proof of Work or Proof of Stake, Nebulas created its own algorithm called Proof of Devotion (PoD). An additional feature would be the Nebulas Force (NF), giving Nebulas and its dApps the ability to perform major updates on the blockchain without executing a hard-fork.

The third and probably most important element is a ranking (NR) and incentive (NI) algorithm. With this component, the Nebulas blockchain will automatically rank dApps, addresses, smart contracts and other elements of blockchains for “liquidity, propagation of users’ assets, and the interactivity between users”. In order to incentivize developers to keep the standards of their blockchain apps high, users who achieve high ranks will be rewarded with Nebulas Tokens.” — Midastouchconsulting

“So, how about using Web 3.0 to avoid privacy clutters?

Storj is a cloud-based data storing platform that uses client-side encryption for security reasons. Data owners can trust and access their files easily. It is a decentralized network that delivers great performance, functionality and durability.

Brave is a browser that provides unparallel privacy and security. It prevents tracking and keeps information safe and secured. It stays private on your device until you delete it.” — Hackernoon

Web 3.0 will change our lives drastically. It’ll make for trouble-free searching of anything online while keeping our data secure. With the growth in the field of digital technology, Web 3.0 (or dWeb) has arrived! It’s just a matter of time before we take a leap into another era of the internet. Good job geeks!

The Future is Here! Go Crypto!

Risksavage.com

Facebook.com/therealrisksavage

Instagram.com/therealrisksavage

Twitter.com/realrisksavage




SOURCE

LEAVE A REPLY

Please enter your comment!
Please enter your name here