Does Data Poverty Lead to More Cyber Attacks?

The way we communicate, share data and use technology to act on those insights is changing – and it’s all leading to the cloud.

On In the Cloud, every week new experts will engage in a fire side chat and will bring their extensive experience in software, IT and mobile solutions straight to you, offering a glimpse into the future of cloud connectivity around.

On this episode of In The Cloud, Host Hilary Kennedy talked with Ari Jacoby, the CEO and Co-Founder of Deduce, a leading provider of cyber-security solutions powered by real-time identity network data. They received an honorable mention from Fast Company’s 2021 World-Changing Ideas Awards in AI and Data. They were also a Top Ten Finalist for the RSAC Innovation Sandbox Contest. They talked about the rise in cyberattacks, the gaps in tools companies have in their cybersecurity arsenal, and how to end data poverty.

Cyberattackers sought to profit from the unprecedented challenges brought on by the pandemic: they disrupted COVID-19 efforts and critical supply chains – supply chain attacks grew 420 percent in just 12 months.

“Between 2019 and 2020, we saw an increase of over 300 percent in account takeover fraud alone,” Jacoby said. “Certainly, COVID was a contributor.”

Part of this was due to workers moving from the office to a home environment. Employees now were using their own devices and their own networks. Everybody was doing everything online, as well, from shopping, ordering groceries, gaming, and for the most part, were living our entire lives online. Unfortunately, the bad guys knew this, too, so they capitalized on it.

Data poverty is another issue heightened during the pandemic. Those without access to data and the internet were forced to live out their lives in the real world and expose themselves to the deadly Coronavirus.

“The idea behind data poverty is that there are just five major companies that control the majority of data required to make high-quality access decisions,” Jacoby said.

Stay Tuned For New Episodes

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

Microschool
With ESA Demand Outpacing Supply, How Can Utah Expand Microschool Access?
March 28, 2025

Across the country, education savings accounts (ESAs) are reshaping how families think about schooling—but in Utah, surging demand is outpacing available options. Last year, roughly 27,000 students applied for Utah’s ESA program, but only 10,000 scholarships were available. While parental interest in alternative education is booming, a new bottleneck is emerging: the supply of…

Read More
freight guards
Can a Single FreightGuard Review End Your Trucking Company? Sadly, Yes
March 27, 2025

As the freight industry grapples with the lingering impacts of a market downturn and rising digital vulnerabilities, a critical question has emerged: how can trucking companies defend their reputations in an era where a single online review can kill a business? In 2023 alone, over 88,000 trucking companies shuttered, and for many, the catalyst…

Read More
workforce in security
Where Security Meets People: Building a Better Industry Through Workforce and Inclusion
March 27, 2025

The security industry is facing a moment of transformation. Amid rapid technological shifts and workforce challenges, companies are realizing that talent — recruiting it, developing it, and retaining it — is now central to long-term success. At the same time, long-overdue conversations around inclusion, representation, and culture are gaining momentum across the sector. According to…

Read More
symmetry connect
The Hidden Power of Identity Management: How Symmetry Connect Is Reshaping Physical Security
March 27, 2025

As organizations face increasing pressure to streamline operations and secure access to sensitive facilities, identity management solutions are becoming a critical focus in the physical security space. While traditional access control handles the “how” of gaining entry, identity management tackles the “who” and “why” — automating the full lifecycle of identity onboarding, change requests, and…

Read More