Five Tips for Securing Sensitive Customer Data - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Securing Sensitive Customer Data-2 Next

Personally identifiable information (PII) data has become a primary target of malicious attacks because it can be exploited for phishing scams to prod for more valuable information such as credit card and bank account numbers. Since there are less regulations and available guidelines on protecting PII data, Protegrity recommends looking to more established regulations and applying their guidelines. For example, by protecting PII as you would financial information, you will ensure that you have the best security measures in place to mitigate the next breach. Organizations can refer to publicly available guidelines, such as PCI DSS 2.0 and others, to establish an internal PII data security policy that is run by the corporate security office.

Protegrity USA, Inc., a provider of end-to-end data security solutions, recently issued guidelines to help companies protect their personally identifiable information (PII), such as names, email addresses and passwords, in the wake of the Epsilon data breach. On Friday, April 1, 2011, Epsilon Interactive announced that unknown intruders had broken into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers, including Best Buy, Citibank, Disney, JPMorgan Chase, Hilton and Marriott. By following standard corporate security office (CSO) protocol and using modern data security solutions, Protegrity believes this breach could have been prevented.

"The Epsilon breach is further evidence that companies and their so-called trusted partners are not following best practices or using the most advanced technologies to secure sensitive customer information," said Iain Kerr, President and CEO for Protegrity USA, Inc. "To avoid breaches like this, companies really need to understand the full scope of their sensitive data flow and concentrate on protecting not just the network but the data itself. The Epsilon case is also a huge wake-up call that companies absolutely need to hold all outside partners that handle their sensitive information to the highest data security auditing standards."

To maximize protection for PII data and eliminate the risk of brand damage resulting from breaches such as the one experienced by Epsilon and its customers, Protegrity offers the following guidelines.

More Slideshows:

Ten-point RFP Checklist for Enterprise Storage Technology Refresh Initiatives Integrating these 10 steps into the storage migration vendor proposal request process reduces operational risk and leads to time and cost savings.

Five Tips for Boosting Web Performance Easy-to-implement tips for improving the performance of your site.

Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.