Five Tips for Mitigating the Fallout from a Big Data Breach

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five steps organizations should take to mitigate the consequences of a Big Data breach, as identified by Mike Heumann, senior director of marketing, Endace division of Emulex.

Big Data is pervasive in the enterprise today, and it is only going to get bigger. For example, IT departments are adopting longer retention times for saved data (six months or longer) which, in turn, requires expansion of their existing networked data storage. And with mandated retention policies like Sarbanes-Oxley to account for, end users are also required to capture every data packet that is transacted and retrieve historical data for analysis without any potential data packet loss.

Organizations need to prepare themselves by expanding their network bandwidth to make their data center ‘Big Data’ ready. They also need to take steps to secure their networks. As the volume of networked data grows, data leaks, security breaches, and packet loss are inevitable. Mike Heumann, senior director of marketing, Endace division of Emulex, offers five tips to mitigate the fallout when it happens.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security99-290x195.jpg 5 Ways to Keep Cybersecurity on Track While on Vacation

Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ...  More >>

Security98-190x128 5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ...  More >>

TufinContinuousCompliance0x 6 Steps for Ensuring Continuous Compliance in a Complex, Hybrid IT Environment

Even with the many challenges of managing today's complex IT environment, it's possible to achieve continuous compliance through proper organization, thorough processes and technology automation. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.