Technology vendors continuously develop well-intentioned, purpose-built functionality, and features intended to enhance our digital experience. They are diligently responding to business and consumer demands for more and faster features to make their lives more convenient and work more cost-efficient. However, new technology is all too often rushed into production with insufficient regard for security and privacy. New features that make things more connected, convenient, efficient, and faster might also empower threat actors to quickly and not so quietly find ways to misuse those features and benefits, making them flaws.\n\nExamples of innovation creating security fails\n\nThis manipulation is a different trend than the malware-based attacks that fill the media with bad headlines of one organization after another being compromised. Here are ten notable high-level examples from just the last five or so years. These features are\/were exploited and imperiled us all.\n\nWhy should any of us care? The cost to an organization that does not take proactive steps to protect itself and waits to react to an incident could be catastrophic to their reputation (bad headline) or bottom and top lines. While a reactive posture is costly, a proactive approach is also expensive and potentially disruptive to business. How costly? IDC\u2019s Worldwide Security Spending Guide forecasts 2023 worldwide spending on security solutions and services to be $219 billion, an increase of 12.1% compared to 2022. These figures do not include incident or breach response expenses, which exponentially increase costs to the impacted organization. Factor in this trend where the threat actors\u2019 goal appears to be disrupting business and these profit and growth-killing expenses can be expected to increase.\n\nBasic security hygiene best bet against flaws in new tech\n\nWhile only some of these flaws have become fully weaponized to steal valuable information or disrupt business, they all could play a part in a multi-fronted attack. So, organizations must act. Fortunately, you can take effective steps without making a huge investment in security solutions. Is your organization taking at least these precautions like (to name a few):\n\nMany of the significant technology innovations and features we have come to enjoy could eventually be exploited as flaws. The actual \u201ccure\u201d is for OEMs and other technology innovators to adopt security and privacy by design with solid ethics driving those elements. Until that mindset is fully embraced and \u201cbaked in,\u201d we will continue to see this trend and its associated damages.