ZDNet published an interesting article titled, Diving into the Dark Web: Where does your stolen data go? We hear about the Dark Web from Hollywood in BlackHat and House of Cards, but what really occurs?
Bitglass conducted an experiment by posting information on the Dark Web.
“By the end of the experiment the fake document of employee data had made its way to North America, South America, Asia, Europe, and Africa. Countries frequently associated with cyber criminal activity, including Russia, China and Brazil, were the most common access points for the identity data.”
It is important for companies to realize the importance of IT security and understand the need to be proactive rather than reactive. For instance, implementing cybersecurity measures after a data breach is too late. The last paragraph of the article summarizes this perfectly.
“Security breaches are unavoidable. It can take months or even years for the enterprise to discover a security problem. By this point, stolen information may have already traveled worldwide. When so many data breaches are preventable, companies need to start investing more heavily not only in cybersecurity as a whole, but also begin tightening internal controls and data protection protocols to mitigate the risk of becoming a new victim in 2015.”