dcsimg

Data Breach: Who’s to Blame?

  • Data Breach: Who’s to Blame?-

    So what can the line of business managers do to help control data access governance? Start asking questions! Ask for a list of everyone who currently has access to data you are responsible for, and ask to be notified for approval before anyone else is given access. Chances are that that may be a difficult task for the IT department unless they have tools in place to provide that data, but the alternative can result in a breach, so it’s worth asking for the data.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Data Breach: Who’s to Blame?

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Data Breach: Who’s to Blame?-5

    So what can the line of business managers do to help control data access governance? Start asking questions! Ask for a list of everyone who currently has access to data you are responsible for, and ask to be notified for approval before anyone else is given access. Chances are that that may be a difficult task for the IT department unless they have tools in place to provide that data, but the alternative can result in a breach, so it’s worth asking for the data.

Data breaches are reported all the time in the news - and often when a breach occurs, fingers are pointed at everyone from hackers, to CSOs, IT and even end users. So in looking at a typical breach, Jackson Shaw, senior director of product management at Quest Software, wanted to break down why the fingers get pointed at these particular people (aside from the hacker, as that’s generally an obvious target) and why they should each care about data governance. For simplicity, he’s going to break this down into three groups: The end user, the IT department, and the line of business manager, and he’ll use the case of financial data.