Keeping Data Secure Is Tougher than Ever
New ways of collecting and analyzing data are creating new opportunities for companies to gain an edge over their competitors and grow their profits. But while data has the potential to create profits, it also has the potential to take them away. If hackers get their hands on your company's data, they can wreak havoc on customer relationships and cause tremendous damage to your brand and reputation.
Security Threats are Proliferating Fast
One thing I've learned during my tenure as editor of eSecurity Planet is that security threats are proliferating so fast, it's tough for even the experts to keep up with them. The most disconcerting thing about high-profile breaches like those at Target and Neiman-Marcus is how long it can take to discover them and how difficult it can be to pinpoint specific methods used by attackers. Hackers themselves have trouble keeping up, as evidenced by a hapless group of attackers who boasted of breaching a British bank website only to discover they had actually attacked a phishing site.
Does that sound scary? It is.
Here is something that may make you feel a little better. (Or it might make you feel worse, depending on your security posture.) Because there is so much low-hanging fruit, hackers tend to focus their efforts on obviously insecure trees.
My goal as editor of eSecurity Planet is to offer advice that companies can use to eliminate the kinds of security gaps that hackers love to exploit. Recently, for example, we published a piece that contained six tips for fighting SQL injection, an attack technique that experts believe is involved in the overwhelming majority of data breaches.
Security Tips: Control Weak Passwords and Train Employees
Weak passwords are another well-known security risk. Yet many users opt for convenience over strength when selecting their passwords. Luckily, there are a number of tools that can help security professionals enforce password policies – a number of which we included in this recent article.
Training employees on security is an obvious best practice, but it's one that a surprisingly high percentage of companies ignore. It's especially important given the large number of employees who admit to practices such as not using passwords on mobile devices used for work. Given this, we collected some suggestions for offering security training that actually works. Targeting training to specific groups of users rather than giving the same presentation to everyone was just one of the good ideas in this piece.
Traditional Network Security is not Adequate
Of course, low-tech practices like employee training only go so far in solving your security challenges. As threats have become more sophisticated, so has the hardware and software designed to help companies detect and mitigate those threats. Because experts agree that traditional perimeter-based approaches to network security are no longer adequate to protect today's mobile workforces, we produced a deep-dive on next generation firewalls, complete with case studies and a handy product comparison matrix.
We also strive to offer coverage that goes beyond the angles that you can readily find elsewhere. Just about every publication spotlighted the XP-related security risks for PCs still running Microsoft's aging operating system. But eSecurity Planet's Sean Michael Kerner took a look at the world's ATMs, the majority of which run XP, to find out if banks – and their customers – should be worried about XP's end of life.
I am nothing if not a realist, so eSecurity Planet even offers coverage that can help you respond effectively to a data breach and minimize your losses if one does occur. If you worry about securing your company's data – and who doesn't, these days? – check out eSecurity Planet.
Ann All is the editor of Enterprise Apps Today and eSecurity Planet. She has covered business and technology for more than a decade, writing about everything from business intelligence to virtualization.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Learn about each of the five generations of computers and major technology developments that have led to the current devices that we use today. Read More »Small Business Marketing's Greatest Hits
The following compilation of small business marketing tips highlights some of the expert advice published over at Small Business Computing. Read More »13 Best Free Android Apps
From secure messaging to document editing, our top free must-have apps have been rated, reviewed and named the best free Android apps of 2015. Read More »
- Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »
With cost and security in mind, we look at five cloud storage options that will suit the needs of most home and SMB owners. Read More »Windows 10 Tips for Desktop PC
Five basic tips to help you customize Windows 10 on your desktop PC. Read More »29 Free Android Apps for Cash-Strapped Students
From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »