Five Tips for Securing Sensitive Customer Data - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Securing Sensitive Customer Data-3 Next

Most companies have focused their data protection strategies on protecting the network where the data is stored, rather than protecting the actual data. Start with an internal data classification audit that walks through your data flow for your internal business processes as well as all external processes with third-party vendors to identify all potentially sensitive data. Outsourcing your database hosting duties does not mean that you outsource liability.

Protegrity USA, Inc., a provider of end-to-end data security solutions, recently issued guidelines to help companies protect their personally identifiable information (PII), such as names, email addresses and passwords, in the wake of the Epsilon data breach. On Friday, April 1, 2011, Epsilon Interactive announced that unknown intruders had broken into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers, including Best Buy, Citibank, Disney, JPMorgan Chase, Hilton and Marriott. By following standard corporate security office (CSO) protocol and using modern data security solutions, Protegrity believes this breach could have been prevented.

"The Epsilon breach is further evidence that companies and their so-called trusted partners are not following best practices or using the most advanced technologies to secure sensitive customer information," said Iain Kerr, President and CEO for Protegrity USA, Inc. "To avoid breaches like this, companies really need to understand the full scope of their sensitive data flow and concentrate on protecting not just the network but the data itself. The Epsilon case is also a huge wake-up call that companies absolutely need to hold all outside partners that handle their sensitive information to the highest data security auditing standards."

To maximize protection for PII data and eliminate the risk of brand damage resulting from breaches such as the one experienced by Epsilon and its customers, Protegrity offers the following guidelines.

More Slideshows:


Ten-point RFP Checklist for Enterprise Storage Technology Refresh Initiatives Integrating these 10 steps into the storage migration vendor proposal request process reduces operational risk and leads to time and cost savings.

Five Tips for Boosting Web Performance Easy-to-implement tips for improving the performance of your site.


Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.