{"id":3770,"date":"2017-12-08T12:25:49","date_gmt":"2017-12-08T12:25:49","guid":{"rendered":"http:\/\/qpol.qub.ac.uk\/?p=3770"},"modified":"2017-12-08T12:25:49","modified_gmt":"2017-12-08T12:25:49","slug":"identity-data-turning-toxic","status":"publish","type":"post","link":"https:\/\/blogs.qub.ac.uk\/qpol\/identity-data-turning-toxic\/","title":{"rendered":"How identity data is turning toxic for big companies"},"content":{"rendered":"\n<p>Google might be&nbsp;<a href=\"http:\/\/www.bbc.co.uk\/news\/technology-42166089\" target=\"_blank\" rel=\"noopener\">in trouble<\/a>&nbsp;for collecting the personal data of its users, but many companies have a growing incentive to rid their hands of the data that users entrust them with. This is because of growing costs of holding onto it.<\/p>\n\n\n\n<p>A major cause is the rising number of cyber attacks where hackers steal the identity information held by companies, often to sell them on to various black markets. Take the&nbsp;<a href=\"http:\/\/www.bbc.co.uk\/news\/business-41474329\" target=\"_blank\" rel=\"noopener\">recent example of US giant Equifax<\/a>, one of the top three companies in the consumer credit reporting industry. It chalked up another 2.5m identity-theft casualties to its existing toll of 143m in October 2017. The firm has suffered a steady stream of identity information loss following a cyber-attack that took place in May this year, where hackers capitalised on weaknesses in its software.<\/p>\n\n\n\n<p>The security breach \u2013 as a primary cause \u2013 resulted in around US$4.8 billion being wiped off Equifax\u2019s market value from May to September 2017. It also tarnished its image and cost the firm\u2019s longstanding CEO his job.<\/p>\n\n\n\n<p>The Equifax data breach is just the tip of the iceberg. The latest Breach Level Index (BLI)&nbsp;<a href=\"http:\/\/breachlevelindex.com\/\" target=\"_blank\" rel=\"noopener\">published<\/a>&nbsp;by digital security company Gemalto shows a mounting figure of around 9.2 billion data-record losses since 2013. The BLI also reports that only a meagre 368m out of the 9.2 billion stolen records were concealed from potential hackers through the use of data-encoding technology.<\/p>\n\n\n\n<p>The rate at which valuable identity information is flying out of the control of firms is alarming \u2013 more than 3,500 records per minute. Around 23% of the top data-breaches over the past five years contained consumers\u2019 identity information \u2013 like names, dates-of-birth, addresses and account passwords. Corporate victims include big names such as Yahoo, eBay and JP Morgan Chase.<\/p>\n\n\n\n<p>Continue reading on <a href=\"https:\/\/theconversation.com\/how-identity-data-is-turning-toxic-for-big-companies-88436\" target=\"_blank\" rel=\"noopener\">The Conversation.<\/a><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/pure.qub.ac.uk\/portal\/en\/persons\/robert-mccausland(df281eb7-0710-4872-bb51-617f1045f02b).html\" target=\"_blank\" rel=\"noopener\">Dr Robert McCausland<\/a> is currently R&amp;D Programme Manager at the Centre for Secure Information Technologies where he leads a data analytics engineering activity focused on cyber security.<\/strong><\/p>\n\n\n\n<p><em>The&nbsp;<a href=\"http:\/\/www.gettyimages.co.uk\/license\/504662110\" target=\"_blank\" rel=\"noopener\">featured&nbsp;image<\/a><\/em>&nbsp;<em>has been used courtesy of a&nbsp;<\/em><a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0\/\" target=\"_blank\" rel=\"noopener\"><em>Creative Commons license<\/em><\/a><em> and <a href=\"http:\/\/www.gettyimages.co.uk\/resources\/embed\" target=\"_blank\" rel=\"noopener\">Getty Images.<\/a><\/em><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dr Robert McCausland and Dr Bhargav Mitra look at the growing costs for companies of holding onto personal data. <\/p>\n","protected":false},"author":2521,"featured_media":3779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[444],"tags":[],"class_list":["post-3770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology"],"mb":[],"acf":{"authors":{"simple_value_formatted":"","value_formatted":"","value":"","field":{"ID":9774,"key":"field_66d0cbf58f930","label":"Authors","name":"authors","aria-label":"","prefix":"acf","type":"relationship","value":null,"menu_order":1,"instructions":"","required":0,"id":"","class":"","conditional_logic":0,"parent":9772,"wrapper":{"width":"","class":"","id":""},"post_type":["authors"],"post_status":["publish"],"taxonomy":"","filters":["search"],"return_format":"id","min":0,"max":10,"allow_in_bindings":0,"elements":["featured_image"],"bidirectional":0,"bidirectional_target":[],"_name":"authors","_valid":1}},"description":{"simple_value_formatted":"","value_formatted":"","value":"","field":{"ID":9776,"key":"field_66d2183027749","label":"Description","name":"description","aria-label":"","prefix":"acf","type":"wysiwyg","value":null,"menu_order":3,"instructions":"","required":0,"id":"","class":"","conditional_logic":0,"parent":9772,"wrapper":{"width":"","class":"","id":""},"default_value":"","allow_in_bindings":0,"tabs":"all","toolbar":"basic","media_upload":0,"delay":1,"_name":"description","_valid":1}}},"jetpack_featured_media_url":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-content\/uploads\/sites\/76\/2017\/12\/Hacker.jpg","jetpack_sharing_enabled":true,"amp_enabled":true,"mfb_rest_fields":["title","jetpack_featured_media_url","jetpack_sharing_enabled","amp_enabled"],"_links":{"self":[{"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/posts\/3770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/users\/2521"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/comments?post=3770"}],"version-history":[{"count":0,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/posts\/3770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/media\/3779"}],"wp:attachment":[{"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/media?parent=3770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/categories?post=3770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.qub.ac.uk\/qpol\/wp-json\/wp\/v2\/tags?post=3770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}