Leak Prevention: Data Security in the Digital Age
- Date: 2007-07-26 - Word Count: 614
Share This!
With a recent spate of high-profile data leaks, the need for reliable data security is top-of-mind for many business owners and administrators. And whether the leaks are intentional, unintentional or malicious in nature, an information leak can cost companies millions of dollars - and the trust of their clients or partners. In fact, according to the 2006 Cost of Data Breach Study from The Ponemon Institute, in 2006, data breaches cost companies an average total of $4.7, or $182 per customer record lost.
"The burden companies must bear as a result of a data breach are significant, making a strong case for more strategic investments in preventative measures such as encryption and data loss prevention," said Dr. Larry Ponemon, chairman and founder of The Ponemon Institute, in a written statement. "Tough laws and intense public scrutiny mean the consequences of poor (data) security are steep - and growing steeper for companies entrusted with managing stores of consumer data."
Among the 31 companies that participated in the study (which all experienced security breaches) the breaches occurred as a result of the following:
- 45% of the data security breaches were a result of lost or stolen laptops, desktops, PDAs, or thumb drives
- 29% were caused by lost or stolen files acquired or used by a third-party
- 26% of the breaches were caused by lost or stolen electronic backups
- 13% were caused by lost or stolen paper records or files
- 10% involved hacked electronic systems
- 6% were caused by malicious insiders
- 6% were caused by malware
- 3% of the data security breaches were caused by a misplaced network or enterprise storage device due to a natural disaster
Data Protection: How to Increase Your Data Security
To diminish the risk of a data security breach, companies need an information-centric solution with proven coverage, simplicity, and data protection capabilities. And whether you choose a product like the Websense Content Protection Suite or another information leak prevention (ILP) solution, there are steps you can take to reduce your risk of losing valuable data. These include:
- Using an ILP tool to discover where the sensitive data resides. This will help you not only inventory the data you have, but help you understand how you can develop a data protection plan to suit your needs.
- Monitor the data on the network and watch how it's used. This will reveal the risks and (perhaps) the broken business processes that exist.
- Set up data protection policies and assign a value to each piece of sensitive information. Once it is determined how sensitive the data is, you can determine the cost-benefit of protecting the data and the value of the data to your organization. With that in mind, you can set parameters for how the data will be accessed, who may access it - and for how long.
- Once the data protection policy has been developed, it's important to educate your employees and explain the consequences that not following the policy will carry.
Unfortunately, no data security plan is foolproof - especially when employees carry laptops from place to place. But with an ILP solution and a data protection policy firmly in place, your chances of experiencing a data leak can significantly decrease.
---
About the Author: David Meizlik is the Product Marketing Manager for Security Solutions at Websense, Inc., the leading provider of web and content security solutions based in San Diego, California. His responsibilities include product positioning, go-to-market strategy and development, market and competitive analysis, program development, and management of all outbound marketing activities for Websense security products. Meizlik served as the marketing manager for emerging business opportunities, and the technology partner marketing manager building the Websense Web Security Ecosystem, an alliance of over 38 technology and distribution partners. For more information about Websense, visit Websense.com.
"The burden companies must bear as a result of a data breach are significant, making a strong case for more strategic investments in preventative measures such as encryption and data loss prevention," said Dr. Larry Ponemon, chairman and founder of The Ponemon Institute, in a written statement. "Tough laws and intense public scrutiny mean the consequences of poor (data) security are steep - and growing steeper for companies entrusted with managing stores of consumer data."
Among the 31 companies that participated in the study (which all experienced security breaches) the breaches occurred as a result of the following:
- 45% of the data security breaches were a result of lost or stolen laptops, desktops, PDAs, or thumb drives
- 29% were caused by lost or stolen files acquired or used by a third-party
- 26% of the breaches were caused by lost or stolen electronic backups
- 13% were caused by lost or stolen paper records or files
- 10% involved hacked electronic systems
- 6% were caused by malicious insiders
- 6% were caused by malware
- 3% of the data security breaches were caused by a misplaced network or enterprise storage device due to a natural disaster
Data Protection: How to Increase Your Data Security
To diminish the risk of a data security breach, companies need an information-centric solution with proven coverage, simplicity, and data protection capabilities. And whether you choose a product like the Websense Content Protection Suite or another information leak prevention (ILP) solution, there are steps you can take to reduce your risk of losing valuable data. These include:
- Using an ILP tool to discover where the sensitive data resides. This will help you not only inventory the data you have, but help you understand how you can develop a data protection plan to suit your needs.
- Monitor the data on the network and watch how it's used. This will reveal the risks and (perhaps) the broken business processes that exist.
- Set up data protection policies and assign a value to each piece of sensitive information. Once it is determined how sensitive the data is, you can determine the cost-benefit of protecting the data and the value of the data to your organization. With that in mind, you can set parameters for how the data will be accessed, who may access it - and for how long.
- Once the data protection policy has been developed, it's important to educate your employees and explain the consequences that not following the policy will carry.
Unfortunately, no data security plan is foolproof - especially when employees carry laptops from place to place. But with an ILP solution and a data protection policy firmly in place, your chances of experiencing a data leak can significantly decrease.
---
About the Author: David Meizlik is the Product Marketing Manager for Security Solutions at Websense, Inc., the leading provider of web and content security solutions based in San Diego, California. His responsibilities include product positioning, go-to-market strategy and development, market and competitive analysis, program development, and management of all outbound marketing activities for Websense security products. Meizlik served as the marketing manager for emerging business opportunities, and the technology partner marketing manager building the Websense Web Security Ecosystem, an alliance of over 38 technology and distribution partners. For more information about Websense, visit Websense.com.
Related Tags: data security, data protection
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Improper Way Of Marketing Reflects Poorly On A Company.
New business, product or service everything requires visibility, awareness in order to come into the - Replacing Paper Prints With Online Versions
Nowadays saving out on resources and being additionally informative are both aspects that are in. In - Stop Smoking Effectively
If I told you of a way that you could stop smoking harmful tobacco would you believe it? Most people - What Is Runtime Error 182? And How To Fix It
Are you finding an effective way to fix runtime error 182? Do you think fixing runtime error 182 is - Do You Know How To Fix Runtime Error 87 In Minutes?
Are you finding an effective way to fix runtime error 87? Do you think fixing runtime error 87 is to - Knowledge About Avi, Avi Player, Avi Converter On Mac
Knowledge about AVI, AVI player, AVI Converter on MacWhat is an AVI?AVI, an acronym for Audio Video - Buy Your Highly Successful Email Survey Software Today
Email Survey Software- Boost Your Business and Increase ProfitsAn email survey software could be one - Xrm - The Anything Relationship Management Solution
I recently attended the Microsoft Dynamics West Region FY11 Sales Planning Retreat. This year's meet - What Are The Benefits Of Working With Electronic Medical Records
Recording medical information is a vital part of health care services. These records are necessary f - Basic Factor To Make Website Business Oriented
Internet is home for millions of websites. The online business is becoming more and more competitive
Most viewed articles in this category:
- Parental Control Software
Parental control software is software that can help parents protect their children when they are onl - Digital Asset Management Software
Managing and organizing your organization's documents is a critical component to your business's suc - AdobeRGB vs. sRGB
Understanding color spaces I'll try to explain it very simplified, but understandable for everyone - Confessions of a Prankster
I wanted to get a jump on April Fool's Day, partially because of the long, cold winter blues, and pa - Malicious Thoughts About The Spyware Ills Of My PC
Who would think I was capable of such revengeful thoughts about the parties responsible for inflicti - Recover File and Recover Deleted File Tools
Data recovery software is a very effective way of retrieving data from a worn or damaged hard disk d - Life without Windows
Ubuntu, a user-friendly version of Linux, has been running so nicely on my home PC that I decided to - What Benefit Does an Online Software Download Site Offer You?
Are you having a problem that where you find a good softeware when you consider to have a try or wan - Maintaining A Website
There was an era when people were talking about how to create a website using html coding or some ea - Benefits Of Proper Time Tracking
Have you ever written down time when you have started and finished your work? Maybe you have had mul