Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: How can companies deal with data overload?
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: How can companies deal with data overload?
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cybersecurity ExecutivesVulnerabilityExpert Opinions

How can companies deal with data overload?

Editorial Team
December 4, 2024 at 11:19 AM
By Editorial Team Editorial Team
Share
Dr. Sanjaya Kumar, MD, CEO of SureShield, Inc.
SHARE
Dr. Sanjaya Kumar, MD, CEO of SureShield, Inc.
Dr. Sanjaya Kumar, MD, CEO of SureShield, Inc.

Sanjaya Kumar, MD, is the CEO of cybersecurity company SureShield, Inc. Dr. Kumar has more than 25 years of healthcare compliance, risk management, and security experience. In an exclusive interview with Cyber Intelligence, he outlines the challenge presented by the current environment of data overload and some of the steps organizations should take to mitigate the associated risks from it.

Cyber Intelligence: People have spoken of companies suffering from data overload – how big a problem is this?

Sanjaya Kumar: Rapid evolution and adoption of Connected Devices, Artificial intelligence (AI), and increasing ready access to harnessing data across multiple channels is exponentially increasing the volumes of data that companies have at their disposal and use. For example, in the USA, personal data is already big business and growing year over year at a rate of eight percent. With data breaches and system hacks also on the rise, exposing millions of customer records on the dark web, companies are learning the high risks associated with amassing large volumes of data and securing it with the required access level controls when in use and when stored.

Cyber Intelligence: In what way is ‘big data’ already ‘big business’ and what challenges does this pose for the data-fueled ecosystem we live in today?

Sanjaya Kumar: Over the last decade, corporations have realized the power of different facets of data and the value that can be realized from mining their data troves. The larger the datasets, stretching over periods of time, the more they can derive deep insights at both the population and individual levels. Today, corporations probably know more about us than we do about ourselves. There are businesses that are focused on only harnessing data and mining for insights that are then sold to other companies to drive their sales and marketing campaigns. Also, huge chunks of personal data are often now sold to third parties. The challenging part is protecting personal data when large quantities of it are bought and sold, changing hands many times. Today, companies are not doing third-party cybersecurity checks or assessments to determine how their data is going to be secured and protected from data breaches and system hacks. Very few companies actually do due diligence on the security of third-party systems today. In my opinion, we have to move away from just signing terms on an agreement to an active mode of ensuring that outsourced vendors have the necessary controls to protect personal data from exposure.

Cyber Intelligence: If people’s data is compromised at some stage, how will they react?

Sanjaya Kumar: In most cases, people have become immune or resigned to the fact that a large portion of their personal data has been exposed already in some data breach or other. In the US, we live in a very litigious environment, so folks are always tempted to sue if they find that their personal data has been compromised. However, most large corporations, when a data breach is made public provide some form of remuneration to their customers to appease them and perhaps avoid a more costly legal suit.  Aside from the people affected, the companies reporting data breaches face regulatory scrutiny and penalties. The average cost of a data breach for companies today is more than $4.5 million.

Cyber Intelligence: How can companies insure themselves against the likely repercussions of compromised customer data?

Sanjaya Kumar: In the USA and the UK, there is now a widespread trend for corporate cybersecurity insurers to run compliance and security risk assessments, and active checks through their clients’ network ecosystems to identify any existing threats and vulnerabilities. They require their customers to correct any compliance gaps and apply remediations to mitigate any risk from threats identified. To do this, they offer a reduction in insurance premiums. Sort of like if you have a car alarm and you park your car in a garage you get a discount on your car insurance. Following the initial compliance and security risk assessments, companies are increasingly being obligated to carry out regular active security scans of their IT environment.

Cyber Intelligence: How can organizations start reducing and safeguarding the vast mountains of personal data they hold?

Sanjaya Kumar: To do this, organizations need to establish policies and procedures on how long they want to keep discrete personal data as opposed to derived and summary-level information, such as insights from their data analytic programs. Personal discrete data should not be kept for longer than its use in deriving the results of the analytics. After this personal data needs to be encrypted and archived in a secure location. Outdated personal information should be deleted on a regular basis where appropriate. We should all note that the weakest link in any security chain is people within companies and the vendors that they work with. Over 70 percent of data breaches result from cybercriminals getting through a company’s defenses through a phishing exercise. With AI, phishing attacks are becoming even more sophisticated and complex. I cannot overstate the importance of staff cyber-training and increasing staff awareness. This is now essential so that unwitting employees do not, for example, fall for phishing lures and click on weaponized links embedded in fake emails from unsolicited sources.

TAGGED: it environment, Cybersecurity, vulnerability, supply chain, customer data, corporate security, sanjaya kumar, artificial intelligence, sureshield, data privacy, data overload, united states, data vulnerability, third party, connected devices, personal data, datasets, expert opinion, critical information, data security
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Stoli Announces Bankruptcy after Ransomware – December 3rd
Next Article INC Ransom Hits Three UK Health Orgs – December 4th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

SpywareNews

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
ChinaCyber EspionageSurveillanceSpywareNews

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025
AI powered ransomware
AIransomwareNews

AI-powered ransomware fuels cybercrime

Cybercriminals are now weaponizing artificial intelligence (AI) to create potentially devastating off-the-shelf ransomware. Researchers at cybersecurity company ESET have discovered what they called "the first known AI-powered ransomware". The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt, and possibly even destroy data, though this last functionality appears not to have been implemented in the malware as yet.

August 28, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?