	{"id":48913,"date":"2015-12-21T13:40:08","date_gmt":"2015-12-21T21:40:08","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=48913"},"modified":"2017-11-22T11:34:03","modified_gmt":"2017-11-22T19:34:03","slug":"2015-top-security-threats-data-breaches-smartphones-and-privacy","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/","title":{"rendered":"2015 Top Security Threats: Data Breaches, Smartphones and Privacy"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/2015-security-trends\/\" rel=\"attachment wp-att-49294\"><img loading=\"lazy\" class=\"aligncenter wp-image-49294 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015-security-trends.jpg\" alt=\"2015 Top Security Threats\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015-security-trends.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015-security-trends-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015-security-trends-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever before,\u00a0resulting in an exponential growth of threats and vulnerabilities. Furthermore, the commonly held viewpoint that Mac OS X users are immune to attacks is fading\u2014and that&#8217;s a good thing, because it means better security protocols\u00a0are being implemented.<\/p>\n<p>In recent years, Apple\u2019s share of the PC market has grown significantly. As OS X continues to increase in popularity, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/category\/malware\/\" target=\"_blank\">Mac malware<\/a> is becoming\u00a0more common, sophisticated, and far more stealthy\u00a0than\u00a0ever. In 2015, it\u2019s safe to say that OS X is no longer the bastion of impenetrable safety that it was once perceived to be.<\/p>\n<p>As was the case <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/\" target=\"_blank\">in 2014<\/a>, data breaches\u2014including espionage and exposure of corporate and consumer data\u2014was a primary theme this past year. Smart device use has also seen incredible growth among adults and children, resulting in massive increases in personal data, which tends to end up in the cloud.\u00a0And finally, the increasing\u00a0popularity of the &#8220;Internet of Things&#8221; (IoT) means new threats are emerging\u00a0as cybercriminals seek to compromise our security and privacy on all fronts.<\/p>\n<p>Here is a\u00a0look at\u00a0the top three security threats of 2015:<\/p>\n<h3>1. Data Breaches<\/h3>\n<p>Data breaches were the most prevalent threat in 2015. Hackers are targeting not just businesses and consumers, but kids too\u2014and not all hackers are after profit, as was the case with the Ashley Madison hack. Here are a few of the <a href=\"http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\" target=\"_blank\">biggest data breaches<\/a> in 2015:<\/p>\n<ul>\n<li><strong>VTech<\/strong> data breach\u2014exposed data on millions of adults and children, including photos and other personal information;\u00a0poor encryption named as the culprit.<\/li>\n<li><strong>Ashley Madison<\/strong>\u2014most sensationalized hack due to the public shaming and outing of the public at large.<\/li>\n<li><strong>U.S. Office of Personnel Management (OPM)<\/strong> data breach\u2014the biggest government hack ever, made possible by a lack of internal expertise and outdated security protocols.<\/li>\n<li><strong>Anthem<\/strong> breach\u2014the largest number of records compromised in a healthcare network; poor password security named as the culprit.<\/li>\n<\/ul>\n<h3>2. Smart Devices<\/h3>\n<p>Smart device use is growing\u00a0exponentially, creating controversy for families as well as opening up new risks for businesses.<\/p>\n<p>Children are being given more leeway to access the Internet on both iPhones and iPads. As a result, the following issues have become a greater concern for parents:<\/p>\n<ul>\n<li><strong>Screen time<\/strong>\u2014too much of it has become a distraction. Even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/kate-winslet-urges-parents-to-limit-kids-screen-time\/\" target=\"_blank\">celebrities have come out urging parents to limit screen time<\/a>.<\/li>\n<li><strong>Bullying evolved<\/strong>\u2014inappropriate online behavior <a href=\"https:\/\/www.intego.com\/mac-security-blog\/sexting-scandal-erupts-parents-urged-to-check-kids-phones\/\" target=\"_blank\">resulting in scandals<\/a> and predation.<\/li>\n<li><strong>App and in app purchases<\/strong>\u2014without proper <a href=\"https:\/\/www.intego.com\/mac-security-blog\/guide-to-in-app-purchases\/\" target=\"_blank\">controls to curb in-app purchases<\/a>, parents are experiencing unexpected expenses.<\/li>\n<\/ul>\n<p>Businesses are also dealing with more and more BYOD in the workplace, opening up the number weak links to access sensitive data.\u00a0In 2015,\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/research-74-percent-using-or-adopting-byod\/\" target=\"_blank\">BYOD statistics show<\/a>\u00a0that 74% of organizations are either already using or\u00a0plan to adopt\u00a0BYOD use. In terms of company size, those with 50 to 249 employees were the most likely to use personal devices at work. The result is an increase in\u00a0wink security links, including:<\/p>\n<ul>\n<li><strong>Outdated security policies<\/strong>\u2014as the threat landscape changes, lack of time and resources do not allow for proper <a href=\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\" target=\"_blank\">security measures to protect business networks<\/a>.<\/li>\n<li><strong>Lack of educuation<\/strong>\u2014employees\u2019 <a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" target=\"_blank\">lack of proper security hygiene<\/a>\u00a0opens\u00a0the gap even wider.<\/li>\n<li><strong>The Internet of Things<\/strong>\u2014more connected devices also increases the number of weak links.<\/li>\n<li><strong>Poor password hygiene<\/strong>\u2014using the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\" target=\"_blank\">same password across all devices puts businesses at risk<\/a> and, in turn, affects consumers whose data was stolen.<\/li>\n<\/ul>\n<h3>3. Data Privacy<\/h3>\n<p>Data privacy is a growing threat stemming from the Internet of Things, where just about everything you own is or will be connected together. This not only opens up concerns about security weak links\u2014presenting new opportunities for cybercriminals to compromise our security and privacy\u2014but lack of privacy for both adults and children.<\/p>\n<ul>\n<li><strong>Unchecked surveillance<\/strong>\u2014schools <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-maintain-your-privacy-on-the-internet\/\" target=\"_blank\">gathering behavioral information about children<\/a> to create data profiles\u2014all without parents\u2019 consent.<\/li>\n<li><strong>Convenience trumps privacy<\/strong>\u2014adults and children who freely give away personal information as a compromise for convenience.<\/li>\n<li><strong>Big Data<\/strong>\u2014information <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-maintain-your-privacy-on-the-internet\/\" target=\"_blank\">gathering of personal data that is bought and sold<\/a> without consumer knowledge or consent.<\/li>\n<\/ul>\n<p>All this points out an important\u00a0fact: no matter what operating system you\u00a0have\u00a0and no matter how small or large your business is, security is no longer &#8220;nice to have,&#8221; but is a must-have tool in your arsenal. While no one solution is 100% perfect, here are four essential actions you can take right now to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\">protect your data and your Mac<\/a>:<\/p>\n<ol>\n<li><strong>Implement a layered approach to security<\/strong>: there are\u00a0a variety of threats targeting you nowadays, and while anti-virus can stop malicious files, it&#8217;s not enough to prevent the other worries from filtering through and ruining your stuff.<\/li>\n<li><strong>Regularly update your passwords<\/strong>: frequently changing your\u00a0password using special characters and a combination of upper and lower case characters significantly reduces the chance that hackers will figure out your password.<\/li>\n<li><strong>Stay informed<\/strong>: go to our sidebar and sign up for our Mac Security Newsletter!<\/li>\n<li><strong>Scan your Mac for potential viruses and malware using trusted\u00a0<a href=\"https:\/\/www.intego.com\/mac-protection-bundle-x8\" target=\"_blank\">Mac anti-virus software<\/a><\/strong>: Intego VirusBarrier will eradicate all known-malware and even prevent infection of iOS devices.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever before,\u00a0resulting in an exponential growth of threats and vulnerabilities. Furthermore, the commonly held viewpoint that Mac OS X users are immune to attacks is fading\u2014and that&#8217;s a good thing, because it means [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":49297,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[2617,43,3313,106,1852,2563],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2015 Top Security Threats: Data Breaches, Smartphones and Privacy - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-21T21:40:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-22T19:34:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"2015 security trends\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/\",\"name\":\"2015 Top Security Threats: Data Breaches, Smartphones and Privacy - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage\"},\"datePublished\":\"2015-12-21T21:40:08+00:00\",\"dateModified\":\"2017-11-22T19:34:03+00:00\",\"description\":\"Reflecting on the security and privacy\\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2015 Top Security Threats: Data Breaches, Smartphones and Privacy\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"2015 Top Security Threats: Data Breaches, Smartphones and Privacy\",\"datePublished\":\"2015-12-21T21:40:08+00:00\",\"dateModified\":\"2017-11-22T19:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage\"},\"wordCount\":866,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg\",\"keywords\":[\"2015\",\"Data Breach\",\"Internet of Things (IoT)\",\"Privacy\",\"Security Threats\",\"Smartphones\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/","og_locale":"en_US","og_type":"article","og_title":"2015 Top Security Threats: Data Breaches, Smartphones and Privacy - The Mac Security Blog","og_description":"Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever","og_url":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-12-21T21:40:08+00:00","article_modified_time":"2017-11-22T19:34:03+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg","width":400,"height":260,"caption":"2015 security trends"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/","name":"2015 Top Security Threats: Data Breaches, Smartphones and Privacy - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage"},"datePublished":"2015-12-21T21:40:08+00:00","dateModified":"2017-11-22T19:34:03+00:00","description":"Reflecting on the security and privacy\u00a0landscape of 2015, three trends stand out: there are more users, more data, and more devices than ever","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"2015 Top Security Threats: Data Breaches, Smartphones and Privacy"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"2015 Top Security Threats: Data Breaches, Smartphones and Privacy","datePublished":"2015-12-21T21:40:08+00:00","dateModified":"2017-11-22T19:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#webpage"},"wordCount":866,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg","keywords":["2015","Data Breach","Internet of Things (IoT)","Privacy","Security Threats","Smartphones"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/2015-top-security-threats-data-breaches-smartphones-and-privacy\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/2015_Security-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cIV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48913"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=48913"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48913\/revisions"}],"predecessor-version":[{"id":48973,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48913\/revisions\/48973"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/49297"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=48913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=48913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=48913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}