Five Tips for Securing Sensitive Customer Data - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Securing Sensitive Customer Data-3 Next

Most companies have focused their data protection strategies on protecting the network where the data is stored, rather than protecting the actual data. Start with an internal data classification audit that walks through your data flow for your internal business processes as well as all external processes with third-party vendors to identify all potentially sensitive data. Outsourcing your database hosting duties does not mean that you outsource liability.

Protegrity USA, Inc., a provider of end-to-end data security solutions, recently issued guidelines to help companies protect their personally identifiable information (PII), such as names, email addresses and passwords, in the wake of the Epsilon data breach. On Friday, April 1, 2011, Epsilon Interactive announced that unknown intruders had broken into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers, including Best Buy, Citibank, Disney, JPMorgan Chase, Hilton and Marriott. By following standard corporate security office (CSO) protocol and using modern data security solutions, Protegrity believes this breach could have been prevented.

"The Epsilon breach is further evidence that companies and their so-called trusted partners are not following best practices or using the most advanced technologies to secure sensitive customer information," said Iain Kerr, President and CEO for Protegrity USA, Inc. "To avoid breaches like this, companies really need to understand the full scope of their sensitive data flow and concentrate on protecting not just the network but the data itself. The Epsilon case is also a huge wake-up call that companies absolutely need to hold all outside partners that handle their sensitive information to the highest data security auditing standards."

To maximize protection for PII data and eliminate the risk of brand damage resulting from breaches such as the one experienced by Epsilon and its customers, Protegrity offers the following guidelines.

More Slideshows:


Ten-point RFP Checklist for Enterprise Storage Technology Refresh Initiatives Integrating these 10 steps into the storage migration vendor proposal request process reduces operational risk and leads to time and cost savings.

Five Tips for Boosting Web Performance Easy-to-implement tips for improving the performance of your site.


Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.