{"id":235164,"date":"2017-08-16T16:53:11","date_gmt":"2017-08-16T20:53:11","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/cybersecurity-profits-are-hiding-in-the-shadows-investorplace-com.php"},"modified":"2017-08-16T16:53:11","modified_gmt":"2017-08-16T20:53:11","slug":"cybersecurity-profits-are-hiding-in-the-shadows-investorplace-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/mind-upload\/cybersecurity-profits-are-hiding-in-the-shadows-investorplace-com.php","title":{"rendered":"Cybersecurity Profits Are Hiding in the Shadows &#8211; Investorplace.com"},"content":{"rendered":"<p><p>    I was really stuffed for time, and my big pipe data    connection at home seemed like it had all the bandwidth of a    straw. What was going on? Ah, the hell with it, I thought. I    called my colleague, who was waiting for me to email an    important file.  <\/p>\n<p>      cobain86 \/ Pixabay    <\/p>\n<p>    Hey, my connections a little slow. Ill send you the link via    Google Docs, and you can upload the file yourself.  <\/p>\n<p>    Little did I know that I was about to commit an act of    potential corporate sabotage.  <\/p>\n<p>    Its called shadow IT  and its a key reason why    cybersecurity companies will keep growing for years to come  <\/p>\n<p>    Using an innocuous cloud service like Google Docs is just one example.  <\/p>\n<p>    What if you regularly bring your own personal tablet to work to    do company business? Or maybe youre plugging in a little thumb    drive into your workstations USB port to informally transfer    files in and out of your office network?  <\/p>\n<p>    Or in a large business, someone forgets to tell the IT    department about that big, new Wi-Fi printer\/scanner that was    installed a few months back?  <\/p>\n<p>    Those are just a few examples of shadow IT. The more people who    use a network (and the more devices and systems attached to    it), the bigger the vulnerabilities.  <\/p>\n<p>    For instance, a recent survey found that the    average hospital was running more than 900 cloud services    alone!  <\/p>\n<p>    No wonder health care firms seem to fare the worst whenever a    new virus or computer attack arises. As just one example among    hundreds, the recent ransomware attacks that swept across    Europe, Asia and the U.S. back in June disabled the digital dictation    service used by hospitals in San Antonio, Texas  bringing    consultations, referrals and, most importantly, billing to an    abrupt halt.  <\/p>\n<p>    In another example a few years ago, Chinese hackers broke into    the computer networks of one of the nations largest hospital    groups, Community Health Systems, and stole the personal data    records for more than 4 million patients.  <\/p>\n<p>    Its no wonder then that in a recent survey by Beckers Hospital Review,    73% of hospitals said they would increase their spending on    cybersecurity.  <\/p>\n<p>    If we do a little math, an average hospitals yearly revenue is    around $160 million. Of that, a hospital will spend roughly    2.5%, or $4 million, on IT. Multiply that figure by the 5,000    or so hospitals in the United States, and it soon adds up to a    wave of new spending on cybersecurity products and services.  <\/p>\n<p>    And bear in mind, thats only one part of the U.S. economy.  <\/p>\n<p>    Thats why experts believe cybersecurity is on track to be a $1    trillion business by 2021. A major uptick in spending is coming    down the line to the tune of 12% to 15% year-over-year growth    through 2021, according to analysts.  <\/p>\n<p>    Its also the reason why Im making cybersecurity one of the    cornerstones of my Total Wealth Insider service. Our    next stock picks are designed to ride the massive spending wave    coming to this critical part of the global economy.  <\/p>\n<p>    Kind regards,  <\/p>\n<p>    Jeff L. Yastine  <\/p>\n<p>    Editor, Total Wealth Insider  <\/p>\n<p>    Editors Note: Bob Baumans Passport Book    contains secrets for keeping your personal information safe     such as the one nation that offers the highest level of    personal and business privacy in the world. The essential    knowledge in this book can save you from incarceration  and    could even save your life! To order your copy today, click here.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/investorplace.com\/2017\/08\/cybersecurity-profits-are-hiding-in-shadows-ggsyn\/\" title=\"Cybersecurity Profits Are Hiding in the Shadows - Investorplace.com\">Cybersecurity Profits Are Hiding in the Shadows - Investorplace.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> I was really stuffed for time, and my big pipe data connection at home seemed like it had all the bandwidth of a straw. What was going on? Ah, the hell with it, I thought <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/mind-upload\/cybersecurity-profits-are-hiding-in-the-shadows-investorplace-com.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[16],"tags":[],"class_list":["post-235164","post","type-post","status-publish","format-standard","hentry","category-mind-upload"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/235164"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=235164"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/235164\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=235164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=235164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=235164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}