Access and Feeds

CyberSecurity: Three Keys for Securing Corporate Data

By Dick Weisinger

Securing your data takes effort, time and dollars, but the alternative can be extremely costly.  A study from Ponemon estimates that losses resulting from the recovery of a single data breach are now averaging $4 million.

There are three main recommendations from security experts for how businesses can go about securing their enterprise data, as described by Information Management.  The methods recommended include: authentication, maintaining an audit trail, and encrypting data.

These are the three primary techniques, but they are far from the only tools that enterprises can employ to keep their data secure. Other cybersecurity tools include intrusion detection, masking of sensitive data, computer forensics capabilities, application whitelisting, firewalls, and antivirus software.

Let’s look at the the three main techniques.

Authentication/Authorization –  Authentication allows the system to validate the identity of a user (“who are you?”).  Authorization goes further and defines what you as a user are allowed to see and what privileges you have for changing data (“what can you do?”).  This is your first line of defense for obtaining access to your system and your data.

Audit Trail – The audit trail provides a recorded chronological sequence of events that allow the actions that occurred within a system to be traced.  Each action can be identified and associated with the details of that operation, who performed it and when it was done.  Using this information, it is possible to trace backwards in time to research events that have occurred within your system.

Encryption – encryption prevents the ability to read data without providing additional credentials.  Encryption provides another level of security for preventing unwanted access.  Many of the breaches reported in the news today can be prevented by encrypting data.

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *

*