DATA SECURITY

Data is an important asset for any vertical. It is hard to overstate the importance of data security. The 2016 threat environment for hacking and breaching is quite dangerous. Bad actors overseas in places like Nation/Non-Sponsored Intruders frequently raid companies of all sizes looking for anything they can find, from personal information to commit fraud with to industrial secrets and strategic plans. Hackers can target a company for anything from the profit motive to political motivations or even just personal enjoyment. Ventures need to be aware of the damage that these breaches can cause so they can prepare themselves for the worst. There are many bad outcomes that result from a hack, breach, or leak. First of all, there is the sensitivity of the data itself.

Ransomware attacks can affect any industry and businesses of any size. Ransomware attacks can affect any industry and businesses of any size. The data in the Malwarebytes report found that these kinds of attacks were most common in healthcare industries but also significant in banking, insurance and the financial sector. Ransomware is a sophisticated and new type of malware which doesn’t focus on stealing data. It works by blocking user access to their data, which can in many instances means business grinds to a halt. For More: Ransomware 

Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural/administrative and physical. Database security is a specialist topic within the broader realms of computer security, information security and risk management. (WiKi)

Read more : Cybersecurity: “Change or Die”

Security risks to database systems include, for example:

• Unauthorized or unintended activity or misuse by authorized database users, database administrators, or network/systems managers, or by unauthorized users or hackers (e.g. inappropriate access to sensitive data, metadata or functions within databases, or inappropriate changes to the database programs, structures or security configurations);

• Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data, deletion of or damage to the data or programs, interruption or denial of authorized access to the database, attacks on other systems and the unanticipated failure of database services;

• Overloads, performance constraints and capacity issues resulting in the inability of authorized users to use databases as intended;

• Physical damage to database servers caused by computer room fires or floods, overheating, lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and obsolescence;

• Design flaws and programming bugs in databases and the associated programs and systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data loss/corruption, performance degradation etc.;

• Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/criminal damage etc

The 8 steps for the 99% solution are as follows

1. Protect Database Servers with a firewall

2. Adopt Good Account Keeping Practices

3. Use the principle of least privilege

4. Assess vulnerability and keep up to date with patches

5. Develop and enforce coding standards

6. Use Encryption

7. Enable Auditing

8. Deploy Network based Intrusion Detection/Prevention Systems

Cybersecurity including online standards, hacking awareness, and increasing digital defense. Every year, we spend more money and time combating the dark forces of cyberspace: state-sponsored operatives, organized crime rings and super-hackers armed with black-ops tech. The attack methods mutate constantly, growing more cancerous and damaging. Massive data breaches and their ripple effects compel organizations of every kind to grapple with risk and security at a more fundamental level.

For more: C3-Cyber Cyber-Crime , Cyberwar, Cyber-Terrorism 

Remember, hacks happen to everyone. It’s up to you to choose how you will control the hack’s fallout and minimize the damage. Expect the best and prepare for the worst.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s