Apple-backed Study Finds Rise in Data Breaches

The study, which does not include any findings of data breaches at Apple itself, argues that breaches are becoming so commonplace that the only feasible way to protect consumer data is wider use of end-to-end encryption

In the first nine months of 2023, U.S. data breaches increased by 20% compared to the full year 2022, according to a new study that was commissioned by Apple.

The iPhone maker paid for the study, which was conducted by Massachusetts Institute of Technology Professor Stuart E. Madnick, about a year after it rolled out a new feature to expand end-to-end encryption for data stored in its iCloud service. The study, which does not include any findings of data breaches at Apple itself, argues that breaches are becoming so commonplace that the only feasible way to protect consumer data is wider use of end-to-end encryption.

Such encryption makes it impossible for the company that stores the data – or anyone who might hack its servers – to unscramble a user’s data without also possessing additional information, such as the passcode for one of the user’s personal devices. But that encryption approach also makes it impossible for law enforcement officials to access the data without the user’s knowledge and has long been a friction point between technologists and government officials.

Britain is considering a law that would mandate access to private messages and has encouraged companies such as Meta Platforms not to expand their use of end-to-end encryption.

The Apple-backed study, however, found that technology companies are frequently attacked by hackers because they provide services to valuable targets. Microsoft, for example, was hit by Chinese hackers this year, who managed to steal tens of thousands of U.S. State Department emails.

The study said that 98% of organizations have a relationship with at least one technology vendor that experienced a data breach in the previous two years.

“In today’s interconnected world, virtually every organization relies on a wide range of vendors and software. As a result, hackers only need to exploit vulnerabilities in third-party software or a vendor’s system to gain access to the data stored by every organization that relies on that vendor,” the study said.

– Reuters

Related posts

IBM Study: More Companies Turning to Open-Source AI Tools to Unlock ROI

RUCKUS Wi-Fi 6 Solution Improves Campus Experience for Amrita University

Team Computers Launches Global Delivery Center in Uttarakhand to Transform Rural India

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More