Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » Blog »

Keeping Data Secure Is Tougher than Ever

New ways of collecting and analyzing data are creating new opportunities for companies to gain an edge over their competitors and grow their profits. But while data has the potential to create profits, it also has the potential to take them away. If hackers get their hands on your company's data, they can wreak havoc on customer relationships and cause tremendous damage to your brand and reputation.

Security Threats are Proliferating Fast

One thing I've learned during my tenure as editor of eSecurity Planet is that security threats are proliferating so fast, it's tough for even the experts to keep up with them. The most disconcerting thing about high-profile breaches like those at Target and Neiman-Marcus is how long it can take to discover them and how difficult it can be to pinpoint specific methods used by attackers. Hackers themselves have trouble keeping up, as evidenced by a hapless group of attackers who boasted of breaching a British bank website only to discover they had actually attacked a phishing site.

Does that sound scary? It is.

Here is something that may make you feel a little better. (Or it might make you feel worse, depending on your security posture.) Because there is so much low-hanging fruit, hackers tend to focus their efforts on obviously insecure trees.

My goal as editor of eSecurity Planet is to offer advice that companies can use to eliminate the kinds of security gaps that hackers love to exploit. Recently, for example, we published a piece that contained six tips for fighting SQL injection, an attack technique that experts believe is involved in the overwhelming majority of data breaches.

Security Tips: Control Weak Passwords and Train Employees

Weak passwords are another well-known security risk. Yet many users opt for convenience over strength when selecting their passwords. Luckily, there are a number of tools that can help security professionals enforce password policies – a number of which we included in this recent article.

Training employees on security is an obvious best practice, but it's one that a surprisingly high percentage of companies ignore. It's especially important given the large number of employees who admit to practices such as not using passwords on mobile devices used for work. Given this, we collected some suggestions for offering security training that actually works. Targeting training to specific groups of users rather than giving the same presentation to everyone was just one of the good ideas in this piece.

Traditional Network Security is not Adequate

Of course, low-tech practices like employee training only go so far in solving your security challenges.  As threats have become more sophisticated, so has the hardware and software designed to help companies detect and mitigate those threats. Because experts agree that traditional perimeter-based approaches to network security are no longer adequate to protect today's mobile workforces, we produced a deep-dive on next generation firewalls, complete with case studies and a handy product comparison matrix.

We also strive to offer coverage that goes beyond the angles that you can readily find elsewhere. Just about every publication spotlighted the XP-related security risks for PCs still running Microsoft's aging operating system. But eSecurity Planet's Sean Michael Kerner took a look at the world's ATMs, the majority of which run XP, to find out if banks – and their customers – should be worried about XP's end of life.

I am nothing if not a realist, so eSecurity Planet even offers coverage that can help you respond effectively to a data breach and minimize your losses if one does occur. If you worry about securing your company's data – and who doesn't, these days? – check out eSecurity Planet.

Ann All - Editor

Ann All is the editor of Enterprise Apps Today and eSecurity Planet. She has covered business and technology for more than a decade, writing about everything from business intelligence to virtualization.


Make a comment






    (Maximum characters: 1200). You have characters left.


     


    DID YOU KNOW?
    What You Don't Read Can Hurt You

    Does this sound familiar? An online service promises to help your small business cut costs, increase productivity, make your coffee and walk your... Read More »

    Who's Moving Ahead in Cloud Computing?

    The future remains, well, cloudy. But either way: Amazon, look out. Microsoft is gaining fast. Read More »

    We Can't Give Up on Privacy!

    Even new and emerging technologies that can make our lives easier, safer and healthier can jeopardize our privacy. Read More »

    QUICK REFERENCE
    Webopedia Polls

    The trend for the past two years has been for shoppers to spend more online during the holiday season. How do you typically shop for holiday... Read More »

    How to Create a Desktop Shortcut to a Website

    This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Read More »

    Flash Data Storage Vendor Trends

    Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »