Nine Security Threats Posed By Connected Devices

Somebody Will Find Those Attack Vectors And Exploit Them

Having visibility into company data is essential for stopping the bleeding in the event of an attack, Potter said.

HIPAA and PCI require businesses to report the specific data that was exfiltrated and sent out during a breach. Potter said automation can help call out irregularities, but only the human brain can intuitively piece together cause and effect.

The most dangerous spots are the sites where data is collected or aggregated, since the data is how hackers can make lots of money and cause problems.

"I could either have convenience or security," Potter said.