Home / Blogs

Data Breaches and You: ISOC Global Internet Report 2016 Explains Critical Steps You Need to Take Now

Global Internet Report 2016
The economics of building trust online; preventing data breaches
Click to Download Report
Data breaches are the oil spills of the digital economy. Over 429 million people were affected by reported data breaches in 2015—and that number is certain to grow even higher in 2016.

These large-scale data breaches along with uncertainties about the use of our data, cybercrime, surveillance and other online threats are eroding trust on the Internet.

This is why the 2016 edition of our Global Internet Report is dedicated to exploring data breaches, their impact on user trust and their consequences for the global digital economy.

These consequences, not surprisingly, can be serious. The purpose of the report is not to emphasize the problem, but to offer solutions and to emphasize the important role that companies and organizations play in building a more trusted Internet.

A key question raised by the report is:

Why are organisations not taking all available steps to protect the personal information they collect from each of us?

The report examines the issues and walks through a number of case studies that highlight the concerns. It ends with a series of five concrete recommendations for actions we need to take.

This video provides a preview:

We ask you to please read the 2016 GIR, to share the report widely, and to take whatever actions you can to bring about a more trusted Internet.

This issue of trust is so serious that we risk undoing all of the progress we have made over the past three decades. It is time we act together to solve it.

A version of this post was originally published on the Internet Society blog.

By Olaf Kolkman, Principal Internet Technology, Policy, and Advocacy

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global