Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
    data analytics and gold trading
    Data Analytics and the New Era of Gold Trading
    9 Min Read
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Data Security – Why Your Investments May Not Be Enough
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Data Security – Why Your Investments May Not Be Enough
Security

Data Security – Why Your Investments May Not Be Enough

Anand
Anand
5 Min Read
SHARE

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data.

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data. The audit report concludes its assessment by noting that “although IRS has continued to make progress in addressing information security control weaknesses, it had not always effectively implemented access and other controls to protect the confidentiality, integrity, and availability of its financial systems and information.”

The GAO report should find resonance not only among the Government circles, but also among enterprise businesses that continue to fall prey to the latest cyber-hacking attempts. Some independent reports estimate that businesses lose as much as $400 billion each year due to hackers. Despite an increasing focus on data storage and access standards across organizations, security has remained a cat and mouse game where hackers continue to win on a fairly routine basis.

So why aren’t the increasing investments in data security not showing results? One of the major reasons is that a lot of cyber-hacking incidents involve an element of human gullibility. Take the instance of CIA Director John Brennan losing his AOL account to hackers – it involved the hackers posing as Verizon technicians to gather confidential details regarding the victim. Or, the latest revelations about how an embedded chip could be used to bypass security scans and exploiting Android devices – this exploit will not work unless the victim clicks on a link distributed by the hacker. In each of these cases, a momentary lapse of judgement is primarily how hackers gain entry into confidential systems.

More Read

Tag, Anyone?
Three Primary Analytics Lessons Learned from 9/11
Cloud Data Security can’t be overlooked in 2016
Best Practice Cloud Security: Is Your Cloud Secure Inside and Out?
The Use and Abuse of Big Data

Overcoming human gullibility is surely one of the biggest challenges to security professionals and this is not going away anytime soon. However, the loss due to this can be minimized through appropriate investments in data security. One area that has been gaining ground here is data monitoring. Databases Activity Monitoring (DAM) tools are today a part of legal compliance and it involves automating the collection of information about traffic interacting with your database, correlating this traffic with legitimate use and creating policies to prevent unauthorized access and offering prioritized response.

One big advantage of DAM is that it can nullify or at least partly minimize the risks due to human error. A hacker posing as a Verizon technician may not be provided access to the database if it were mapped for legitimate use. Similarly, an Android system that can compare hyperlinks with a real-time database of risky clicks will be able to prevent hackers from gaining ground among a lot of victims.

Besides building tools to intercept and minimize data loss due to human errors, technology can also help with teaching employees how to approach an unanticipated data security incident. When the stakeholders (the platform owner, the customers and the vendors) act in sync and according to pre-established protocol, any trail that does not align with the rest of the users can be tracked and access to it minimized before major database interceptions may be made.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

Diverse Research Datasets
The 5 Best Platforms Offering the Most Diverse Research Datasets in 2026
Big Data Exclusive
macro intelligence and ai
How Permutable AI is Advancing Macro Intelligence for Complex Global Markets
Artificial Intelligence Exclusive
warehouse accidents
Data Analytics and the Future of Warehouse Safety
Analytics Commentary Exclusive
stock investing and data analytics
How Data Analytics Supports Smarter Stock Trading Strategies
Analytics Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Back It Up! The Cloud’s Not As Safe As “They” Say

5 Min Read
vpn for android
Big DataExclusiveITSecurity

Growth of Big Data Requires Android Users to Have VPNs

10 Min Read

Adopting a User Behavior Analytics (UBA) Solution

6 Min Read

Evernote’s Three Laws of Data Protection

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?