The epidemic of high-profile hacking conjures up images of a dragon. Cyberattacks drag a long tail; if attacked you can get seriously burned, and for some, successfully fighting the dragon promises a treasure.
First, the long tail. The massive data breach at Target during the 2013 Christmas shopping season tore away 40 million consumers' sense of security and complacency. The Target attack, while not the first successful theft of credit card data, was a highly visible example in a long parade of data breaches.
As recently reported in the Star Tribune, faked credit cards and debit cards have started appearing in the Twin Cities. Some of the cloned cards have been traced to the massive data breach at Home Depot when 56 million credit cards were potentially compromised nearly two years ago,
Then the IRS recently revealed that 330,000 taxpayers who used their online Get Transcript application this past filing season had their personal information compromised, including Social Security numbers and home addresses. While the actual tax return portion of the IRS website was not breached, according to the agency, this breach puts affected taxpayers and the government at risk of fraudsters falsely claiming refunds in the coming tax season.
The recent demonstration that hackers could remotely take over a car's controls through its in-dash Internet connection, as well as high profile hacks at Sony Pictures and the federal employee personnel records, all illustrate cyber-hacking's long-tail impacts.
How badly burned can one get?
In 2014, organizations around the globe were hit with 42.8 million attempts to breach their cybersecurity firewalls, up 48 percent from the previous year. Those estimates likely understate the extent of the problem as they are based on voluntary responses to a survey of nearly 10,000 executives and managers globally, conducted by the accounting giant PricewaterhouseCoopers (PWC) and International Data Group publications.
PWC acknowledges that some experts estimate up to 71 percent of successful breaches go undetected while other victims are "reluctant to reveal known compromises" for national security reasons or fearing lawsuits, regulators and damage to their reputations.