Your data is valuable. Not just because of the amount of time and money you have spent obtaining it, not just because of the benefits it could provide for your business, but because of how lucrative it could prove to both criminals and to your competitors. You need to be aware of how inadequate data security protocols could be putting your data at risk and potentially harming your staff, your clients, your patients and your business. Take a look at these three common security breaches and learn from the mistakes of other high-profile organisations?
Thumbsucking
?Thumbsucking? is the process of using a USB pen-drive to covertly extract information from a secure location. It is difficult to detect and difficult to defend against, as the US Government found in the mid 1980s when the Los Alamos national laboratory was breached by an existing employee. The laboratory handled many of the nation?s defence secrets, including blueprints referring to up to the minute nuclear weaponry. A Chinese-American employee stole details of these weapons and gave them to the Chinese, allowing them to develop sophisticated nuclear arsenals of their own. If the US government can be duped so easily, we should all learn to take data security seriously indeed.
Hacking
A data thief doesn?t need to be on site to walk away with your valuable data, however. Spyware and sophisticated hacking techniques mean that anywhere with an internet connection is theoretically at risk from cybercriminals, and regardless of its usage your data can be extremely valuable in the wrong hands. Earlier this year, South Korean telecoms company KT had the personal data of around 8 million customers stolen by two hackers who then subsequently sold the data for to the company?s competitors the best part of a million dollars. Don?t take digital security for granted ? get into good habits and protect yourself with the right kind of software to help defend your business from cybercrime.
Physical
It isn?t just digital data that?s at risk, however. Physical, paper data poses its own inherent security dangers, as a Joint Intelligence Committee employee demonstrated so adroitly back in 2008. Unbeknownst to Whitehall, the employee obtained data pertaining to al Qaida security forces in Iraq and Pakistan, only to leave the highly sensitive documents on a commuter train where they were picked up by a member of the public. Fortunately, this story has a happy ending as the documents were handed in to the BBC rather than being allowed to fall into the wrong hands, but we can?t all be so lucky. You need to think long and hard over which data capture method you should use, as each variety has advantages and disadvantages to consider, even where data security is concerned.
Source: http://www.business2community.com/tech-gadgets/data-security-risks-explained-0367057
kim richards robert hegyes mary louise parker mary louise parker cher morgellons nhl all star draft
No comments:
Post a Comment