Data security: Lessons from the front lines of breach research

IBM Ponemon data security breach study Softchoice

Data security is a continuous battle against malicious forces—one in which the key to a successful strategy is information.

Dr. Larry Ponemon, the Chairman and Founder of the Ponemon Institute, has for more than a decade, been on the front lines of data security research.  His organization’s 2016 Cost of Data Breach Study: Global Analysis has telling intelligence for us to take to the trenches in our own fight against malware and privacy threats.

[Read more…]

Zika is not the only virus threatening Olympic spectators

Dell security zika virus olympics

It’s August 5, 2016 and you settle down at your computer to watch the Olympic opening ceremony. You have no fear of catching the Zika virus, unlike the thousands of people in Rio. Feeling safe, you navigate to the official broadcast site of the games and click on Watch the Olympics live…

[Read more…]

Data Breach On The Horizon: Best Practices to Protect Your Assets [McAfee]

It happened to Sony in 2011, and LinkedIn this spring. It’s no secret that data breaches are on the rise. Database security is phenomenally critical to a company’s overall health. A serious breach can result in extreme monetary damage composed of bad publicity, noncompliance fines and business disruption. It can tarnish the reputation of even the most wildly successful organization.

Database security is becoming increasingly complex. One of the reasons for this is that the typical hacker profile has changed dramatically in recent years. Hackers were once thought to be gifted loners only seeking mischief and mayhem. Today, that image has evolved into far more sophisticated organized crime rings of cyberfraud professionals. Their work is long-term focused and is far more damaging. They seek financial gain rather than mischief, and their stealthy tendency leaves no trace of their presence.

Security threats are not limited to external agents – internal users are guilty too. A 2012 study by Ponemon Institute, Aftermath of Data Breach, identified insiders and third parties as most common causes of data breaches. Of incidents that were successfully traced to a root cause, 34 percent were attributed to negligent insiders, 19 percent traced to third-party data outsourcers, and 16 percent to malicious insiders.

With these sophisticated threats created by well-hidden, brilliant professionals ever evolving, mutilating, and knocking at your door, what are the best practices to keep your database security in check? [Read more…]