Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’

  • The exponential rate at which data volume is growing has spawned nonstop cyber-activity intent on using this data for illegal purposes.
  • The danger couldn’t be more extreme – or more real: in today’s internet-dominated world, someone seeking to steal sensitive, confidential or proprietary data (e.g. personally identifiable information) no longer has to physically breach a facility.

– Heidi Parthena White | May 12, 2020