Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Posted May 12, 2020
- The exponential rate at which data volume is growing has spawned nonstop cyber-activity intent on using this data for illegal purposes.
- The danger couldn’t be more extreme – or more real: in today’s internet-dominated world, someone seeking to steal sensitive, confidential or proprietary data (e.g. personally identifiable information) no longer has to physically breach a facility.
– Heidi Parthena White | May 12, 2020