Security In A New Mobile World [Trend Micro]

In case you missed it, Smartphones and other mobile devices overtook traditional PCs in sales back in 2010. How did this happen?

There are a whole host of factors at play. Foremost among them has been consumerization, which gives consumers access to powerful computers and high-speed internet at home. Responding to increased expectations at work, employers began embracing Bring Your Own Device (BYOD) policies and allowing consumer mobile devices – like smartphones, tablets, non-PC laptops and netbooks – into the office. Employees, for their part, started using those devices to access their organization’s corporate networks and cloud service platforms, which helped them become more responsive and productive at home, on the road and in the office.

And everyone lived happily ever after. Well, not quite.

[Read more…]

For IT in Healthcare, An Ounce of Protection is Worth a Pound of Cure [Trend Micro]

No matter what business you’re in, keeping confidential information from ending up in the wrong hands is critical. When you’re in the business of saving lives and improving health, that’s especially true when it comes to patient records.

In fact, with regulatory mandates like the Health Insurance Portability and Accountability Act and HITECH Act, hospitals now face significant penalties if they don’t implement strong and flexible data protection across their networks. That doesn’t just mean data protection on PCs in the hospital. It also means protection of portable data on potentially thousands of mobile endpoints, including tablets, smartphones and USB devices. Even one incident of data leakage can be disastrous – to the patient, and to the healthcare institution’s reputation.

[Read more…]

Data Breach On The Horizon: Best Practices to Protect Your Assets [McAfee]

It happened to Sony in 2011, and LinkedIn this spring. It’s no secret that data breaches are on the rise. Database security is phenomenally critical to a company’s overall health. A serious breach can result in extreme monetary damage composed of bad publicity, noncompliance fines and business disruption. It can tarnish the reputation of even the most wildly successful organization.

Database security is becoming increasingly complex. One of the reasons for this is that the typical hacker profile has changed dramatically in recent years. Hackers were once thought to be gifted loners only seeking mischief and mayhem. Today, that image has evolved into far more sophisticated organized crime rings of cyberfraud professionals. Their work is long-term focused and is far more damaging. They seek financial gain rather than mischief, and their stealthy tendency leaves no trace of their presence.

Security threats are not limited to external agents – internal users are guilty too. A 2012 study by Ponemon Institute, Aftermath of Data Breach, identified insiders and third parties as most common causes of data breaches. Of incidents that were successfully traced to a root cause, 34 percent were attributed to negligent insiders, 19 percent traced to third-party data outsourcers, and 16 percent to malicious insiders.

With these sophisticated threats created by well-hidden, brilliant professionals ever evolving, mutilating, and knocking at your door, what are the best practices to keep your database security in check? [Read more…]