Printer Friendly

Have we forgotten all about data breaches?

In spring 2011, Sony reported on serious breaches of its entertainment network services, ushering in Noun 1. ushering in - the introduction of something new; "it signalled the ushering in of a new era"
first appearance, introduction, debut, entry, launching, unveiling - the act of beginning something new; "they looked forward to the debut of their new product line"
 a period when lots of brands, big and small, were buffeted by data breach claims and incidents.

A year later what has changed? Gary Clarke VP EMEA (Europe, Middle East, Africa) Refers to that region of the world. For example, one might see products packaged differently for the UK, EMEA and Asia Pacific markets. , SafeNet comments on the current state of data protection: "How fast time flies. A year ago Sony was battling with the fall out of the data breach on its entertainment online services. They and organisations as diverse as Epsilon 1. (language) EPSILON - A macro language with high level features including strings and lists, developed by A.P. Ershov at Novosibirsk in 1967. EPSILON was used to implement ALGOL 68 on the M-220. , Steam and even Nasdaq entered the spotlight on a debate about how large organisations offering or relying on digital services needed to totally overhaul their approach to protecting the data entrusted in them by their customers, partners and end users generally. A year later and how much has changed? One school of thought would be that the scale and frequency of these breaches would be a catalyst for change and lead more organisations to take data protection seriously. Is that really happening?

But so far the evidence is that data breaches resulting in the loss of unsecured information continue to be a problem with competing claims on the volume of reported and unreported incidents.

While it is important to recognise how many of these breaches stem from human error as much as actual hacks, all of them present real risks to any affected organisation and range from reputational damage to fines and financial losses. Breaches are going to happen, but the impact of that breach is significantly lessened if the confidential information Noun 1. confidential information - an indication of potential opportunity; "he got a tip on the stock market"; "a good lead for a job"
steer, tip, wind, hint, lead
 that is exposed - whether IP, credit card data, customer data etc - is encrypted and the customer has kept control of the master keys.

Regardless of the good sense of this approach it does seem that organisations aren't going far enough in their data protection strategies. For example we did some polling on our own and found that the majority of IT manager respondents are not utilizing encryption The reversible transformation of data from the original (the plaintext) to a difficult-to-interpret format (the ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Encryption uses an encryption algorithm and one or more encryption keys.  technology beyond IT systems' endpoints to encrypt the actual data and information held inside the perimeter walls. This suggests that many IT managers may not fully appreciate the importance of protecting core data itself with encryption protocols. Despite the increase of data breaches in 201 I the UK businesses participating in the survey said they only plan to encrypt end points rather than extend encryption to the core systems. 68% of breaches and 97% of data records stolen.

www.safenet.com
COPYRIGHT 2012 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2012 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Security News and Products
Publication:Database and Network Journal
Date:Jun 1, 2012
Words:401
Previous Article:Cloud security comment.
Next Article:IPv6: a primer: an introduction to IPv6.
Topics:

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters