Protegrity USA, Inc., a provider of end-to-end data security solutions, recently issued guidelines to help companies protect their personally identifiable information (PII), such as names, email addresses and passwords, in the wake of the Epsilon data breach. On Friday, April 1, 2011, Epsilon Interactive announced that unknown intruders had broken into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers, including Best Buy, Citibank, Disney, JPMorgan Chase, Hilton and Marriott. By following standard corporate security office (CSO) protocol and using modern data security solutions, Protegrity believes this breach could have been prevented.
"The Epsilon breach is further evidence that companies and their so-called trusted partners are not following best practices or using the most advanced technologies to secure sensitive customer information," said Iain Kerr, President and CEO for Protegrity USA, Inc. "To avoid breaches like this, companies really need to understand the full scope of their sensitive data flow and concentrate on protecting not just the network but the data itself. The Epsilon case is also a huge wake-up call that companies absolutely need to hold all outside partners that handle their sensitive information to the highest data security auditing standards."
To maximize protection for PII data and eliminate the risk of brand damage resulting from breaches such as the one experienced by Epsilon and its customers, Protegrity offers the following guidelines.
Ten-point RFP Checklist for Enterprise Storage Technology Refresh Initiatives Integrating these 10 steps into the storage migration vendor proposal request process reduces operational risk and leads to time and cost savings.
Five Tips for Boosting Web Performance Easy-to-implement tips for improving the performance of your site.
Six Unified Communications Application Benefits Unified communications users experience a multitude of benefits – both in terms of employee time savings as well as direct financial savings.
Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ... More >>
Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ... More >>
Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ... More >>