Apple-backed Study Finds Rise in Data Breaches

The study, which does not include any findings of data breaches at Apple itself, argues that breaches are becoming so commonplace that the only feasible way to protect consumer data is wider use of end-to-end encryption

In the first nine months of 2023, U.S. data breaches increased by 20% compared to the full year 2022, according to a new study that was commissioned by Apple.

The iPhone maker paid for the study, which was conducted by Massachusetts Institute of Technology Professor Stuart E. Madnick, about a year after it rolled out a new feature to expand end-to-end encryption for data stored in its iCloud service. The study, which does not include any findings of data breaches at Apple itself, argues that breaches are becoming so commonplace that the only feasible way to protect consumer data is wider use of end-to-end encryption.

Such encryption makes it impossible for the company that stores the data – or anyone who might hack its servers – to unscramble a user’s data without also possessing additional information, such as the passcode for one of the user’s personal devices. But that encryption approach also makes it impossible for law enforcement officials to access the data without the user’s knowledge and has long been a friction point between technologists and government officials.

Britain is considering a law that would mandate access to private messages and has encouraged companies such as Meta Platforms not to expand their use of end-to-end encryption.

The Apple-backed study, however, found that technology companies are frequently attacked by hackers because they provide services to valuable targets. Microsoft, for example, was hit by Chinese hackers this year, who managed to steal tens of thousands of U.S. State Department emails.

The study said that 98% of organizations have a relationship with at least one technology vendor that experienced a data breach in the previous two years.

“In today’s interconnected world, virtually every organization relies on a wide range of vendors and software. As a result, hackers only need to exploit vulnerabilities in third-party software or a vendor’s system to gain access to the data stored by every organization that relies on that vendor,” the study said.

– Reuters

Related posts

Advancing IT Support to the Next Era: TeamViewer Integrates Microsoft Teams into its AI-Powered Insights

“Automation Anywhere: Pioneering the Transformation of Enterprise Business Processes in India”

Accenture Expands Generative AI-Powered Cybersecurity Services and Capabilities to Accelerate Clients’ Resilience and Reinvention

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More