{"id":607590,"date":"2023-02-13T07:48:56","date_gmt":"2023-02-13T13:48:56","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/02\/13\/using-the-blockchain-to-prevent-data-breaches\/"},"modified":"2023-02-13T07:48:56","modified_gmt":"2023-02-13T13:48:56","slug":"using-the-blockchain-to-prevent-data-breaches","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/02\/13\/using-the-blockchain-to-prevent-data-breaches\/","title":{"rendered":"Using the blockchain to prevent data breaches"},"content":{"rendered":"<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>Data breaches have, unfortunately, become an all-too-common reality. The <a href=\"https:\/\/info.varonis.com\/hubfs\/docs\/research_reports\/2021-Financial-Data-Risk-Report.pdf\">Varonis<\/a><a href=\"https:\/\/info.varonis.com\/hubfs\/docs\/research_reports\/2021-Financial-Data-Risk-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> 2021 Data Risk Report<\/a> indicates that most corporations have poor <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> practices and unprotected data, making them vulnerable to <a href=\"https:\/\/venturebeat.com\/2022\/05\/20\/report-frequency-of-cyberattacks-in-2022-has-increased-by-almost-3m\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyberattacks<\/a> and data loss.<\/p>\n<p>With a single data breach costing a company an average of <a href=\"https:\/\/www.capita.com\/sites\/g\/files\/nginej146\/files\/2020-08\/Ponemon-Global-Cost-of-Data-Breach-Study-2020.pdf\">$3.86<\/a><a href=\"https:\/\/www.capita.com\/sites\/g\/files\/nginej146\/files\/2020-08\/Ponemon-Global-Cost-of-Data-Breach-Study-2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> million<\/a> and eroding a brand\u2019s reputation and its consumers\u2019 trust, mitigating the risks is no longer a luxury. However, as cyberattacks get more pervasive and sophisticated, merely patching up traditional cybersecurity measures may not be enough to fend off future data breaches.<\/p>\n<p>Instead, it\u2019s imperative to start seeking more advanced security solutions. As far as innovative solutions go, preventing data breaches by utilizing the <a href=\"https:\/\/venturebeat.com\/ai\/blockchain-startups-are-proliferating-rapidly-here-are-10-to-watch\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain<\/a> may be our best hope.<\/p>\n<p>Blockchain technology, also referred to as distributed ledger technology (DLT), is the culmination of decades of research and <a href=\"https:\/\/www.vpnreactor.com\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">advancement in cryptography and cybersecurity<\/a>. The term \u201cblockchain\u201d was first popularized thanks to <a href=\"https:\/\/venturebeat.com\/2022\/05\/12\/using-cryptocurrency-to-attract-and-retain-employees\/\" target=\"_blank\" rel=\"noreferrer noopener\">cryptocurrency<\/a>, as it\u2019s the technology behind record-keeping in the Bitcoin network.\u00a0<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>This technology makes it extremely difficult to change or hack a system, as it allows for the data to be recorded and distributed but not copied. Since it provides a brand-new approach to storing data securely, it can be a promising solution for data breaches in any environment with high-security requirements.<\/p>\n<p>Built on the idea of P2P networks, a blockchain is a public, digital ledger of stored data shared across a whole network of computer systems. Each block holds several transactions, and whenever a new transaction happens, a record of that transaction gets added to every network participant\u2019s ledger.<\/p>\n<p>Its robust encryption and decentralized and immutable nature could be the answer to preventing data breaches.<\/p>\n<h2 id=\"h-enhancing-data-security-via-encryption\">Enhancing data security via encryption<\/h2>\n<p>World Wide Web inventor Tim Berners-Lee has said recently that \u201c<a href=\"https:\/\/webfoundation.org\/2017\/03\/web-turns-28-letter\/\">we\u2019ve lost <\/a><a href=\"https:\/\/webfoundation.org\/2017\/03\/web-turns-28-letter\/\" target=\"_blank\" rel=\"noreferrer noopener\">control of our personal data.<\/a>\u201d Companies store enormous amounts of personally identifiable information (PII), including usernames, passwords, payment details, and even social security numbers, as the Domino\u2019s data leak in India (amongst others) has made clear.<\/p>\n<p>While this data is almost always encrypted, it\u2019s never as secure as it would be in a blockchain. By making use of the best aspects of cryptography, blockchain can finally put an end to data breaches.<\/p>\n<p>How can a shared ledger be more secure than standard encryption methods?<\/p>\n<p>To secure stored data, blockchain employs two different types of cryptographic algorithms: <strong>hash functions<\/strong> and <strong>asymmetric-key algorithms<\/strong>. This way, the data can only be shared with the member\u2019s consent, and they can also specify how the recipient of their data can use the data and the window of time in which the recipient is allowed to do so.<\/p>\n<h3 id=\"h-hash-functions\">Hash functions<\/h3>\n<p>When the first transaction of a chain occurs, the blockchain\u2019s code gives it a unique hash value. As more transactions occur, their hash values are then hashed and encoded into a Merkle tree, thereby creating a block. Every block gets a unique hash with the hash of the previous block\u2019s header and timestamp encoded.<\/p>\n<p>This creates a link between the two blocks, which, in turn, becomes the first link in the chain. Since this link is created using unique information from each block, the two are immutably bound.<\/p>\n<h3 id=\"h-asymmetric-encryption\">Asymmetric encryption<\/h3>\n<p>Asymmetric encryption, also known as public-key cryptography, encrypts plain text using two keys: a private key that\u2019s typically produced via a random number algorithm, and a public one. The public key is available freely and can be transferred over unsecured channels.<\/p>\n<p>On the other hand, the private key is kept a secret so that only the user can know it. Without it, it\u2019s almost impossible to access the data. It functions as a digital signature, like real-world signatures.<\/p>\n<p>This way, blockchain gives individual consumers the ability to manage their own data and specify with whom to share it over cryptographically encoded networks.\u00a0<\/p>\n<h2 id=\"h-decentralization\">Decentralization<\/h2>\n<p>A primary reason for the increase in data breaches is over-reliance on centralized servers. Once consumers and app users enter their personal data, it\u2019s directly written into the company\u2019s database, and the user doesn\u2019t get much say in what happens to it afterward.<\/p>\n<p>Even if users attempt to limit the data the company can share with third parties, there will be loopholes to exploit. As the <a href=\"https:\/\/www.vox.com\/2018\/3\/17\/17134072\/facebook-cambridge-analytica-trump-explained-user-data\">Facebook\u2013<\/a><a href=\"https:\/\/www.vox.com\/2018\/3\/17\/17134072\/facebook-cambridge-analytica-trump-explained-user-data\" target=\"_blank\" rel=\"noreferrer noopener\">Cambridge Analytica data-mining scandal<\/a> showed, the results of such centralization can be catastrophic. Additionally, even assuming goodwill, the company\u2019s servers could still get hacked by cybercriminals.<\/p>\n<p>In contrast, blockchains are decentralized, immutable records of data. This decentralization eliminates the need for one trusted, centralized authority to verify data integrity. Instead, it allows users to share data in a trustless environment. Each member has access to their own data, a system known as zero-knowledge storage.<\/p>\n<p>This also makes the network less likely to fall victim to hackers. Unless they bring down the whole network simultaneously, the undamaged nodes will quickly detect the intrusion.<\/p>\n<p>Since decentralization reduces points of weakness, blockchains also have a much lower chance of succumbing to an IP-based <a href=\"https:\/\/venturebeat.com\/security\/crowdsec-ips\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS<\/a> attack than centralized systems using client\/server architectures.<\/p>\n<h2 id=\"h-immutability\">Immutability<\/h2>\n<p>In addition to being decentralized, blockchains are also designed to be immutable, which increases data integrity. The blockchains\u2019 immutability makes all the data stored therein almost impossible to alter.<\/p>\n<p>Because every individual in the network has access to a copy of the distributed ledger, any corruption that occurs in a member\u2019s ledger will automatically cause it to be rejected by the rest of the network members. Therefore, any alteration or change in the block data will lead to inconsistency and break the blockchain, rendering it invalid.<\/p>\n<h2 id=\"h-the-bottom-line\">The bottom line<\/h2>\n<p>Even though blockchain technology has been around since 2009, it has much untapped potential in the field of cybersecurity, especially when it comes to preventing data breaches.<\/p>\n<p>The top-notch cryptography employed by blockchain protocols guarantees the safety of all data stored in the ledger, making it a promising solution.<\/p>\n<p>Since nodes running the blockchain must always verify any transaction\u2019s validity before it\u2019s executed, cybercriminals are almost guaranteed to be stopped in their tracks before they gain access to any private data.<\/p>\n<p><em>Jenelle Fulton-Brown is a security architect and internet privacy advocate based in Toronto, Canada helping Fortune 500 companies build future-proof internal systems.<\/em><\/p>\n<div id=\"boilerplate_2736392\">\n<h3 id=\"h-datadecisionmakers\">DataDecisionMakers<\/h3>\n<p>Welcome to the VentureBeat community!<\/p>\n<p>DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.<\/p>\n<p>If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.<\/p>\n<p>You might even consider\u00a0<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/venturebeat.com\/contribute-to-datadecisionmakers\/\">contributing an article<\/a>\u00a0of your own!<\/p>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/venturebeat.com\/category\/DataDecisionMakers\/\" target=\"_blank\">Read More From DataDecisionMakers<\/a><\/p>\n<\/div><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/using-the-blockchain-to-prevent-data-breaches\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Jenelle Fulton-Brown<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out all the on-demand sessions from the Intelligent Security Summit here. Data breaches have, unfortunately, become an all-too-common reality. The Varonis 2021 Data Risk Report indicates that most corporations have poor cybersecurity practices and unprotected data, making them vulnerable to cyberattacks and data loss.With a single data breach costing a company an average of<\/p>\n","protected":false},"author":1,"featured_media":607591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4644,46,151],"tags":[],"class_list":{"0":"post-607590","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blockchain","8":"category-technology","9":"category-using"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/607590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=607590"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/607590\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/607591"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=607590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=607590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=607590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}