Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Data Security – Why Your Investments May Not Be Enough
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Data Security – Why Your Investments May Not Be Enough
Security

Data Security – Why Your Investments May Not Be Enough

Anand
Anand
5 Min Read
SHARE

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data.

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data. The audit report concludes its assessment by noting that “although IRS has continued to make progress in addressing information security control weaknesses, it had not always effectively implemented access and other controls to protect the confidentiality, integrity, and availability of its financial systems and information.”

The GAO report should find resonance not only among the Government circles, but also among enterprise businesses that continue to fall prey to the latest cyber-hacking attempts. Some independent reports estimate that businesses lose as much as $400 billion each year due to hackers. Despite an increasing focus on data storage and access standards across organizations, security has remained a cat and mouse game where hackers continue to win on a fairly routine basis.

So why aren’t the increasing investments in data security not showing results? One of the major reasons is that a lot of cyber-hacking incidents involve an element of human gullibility. Take the instance of CIA Director John Brennan losing his AOL account to hackers – it involved the hackers posing as Verizon technicians to gather confidential details regarding the victim. Or, the latest revelations about how an embedded chip could be used to bypass security scans and exploiting Android devices – this exploit will not work unless the victim clicks on a link distributed by the hacker. In each of these cases, a momentary lapse of judgement is primarily how hackers gain entry into confidential systems.

More Read

Smart Tips for Better Maritime Security
Smart Tips for Better Maritime Security
How Cybersecurity Is Creating Opportunities For Young People
Private Cloud Computing: How It Changes Disaster Recovery
The Small Business Guide to Data and Network Security
Now Lawyers Can Use the Cloud, Too

Overcoming human gullibility is surely one of the biggest challenges to security professionals and this is not going away anytime soon. However, the loss due to this can be minimized through appropriate investments in data security. One area that has been gaining ground here is data monitoring. Databases Activity Monitoring (DAM) tools are today a part of legal compliance and it involves automating the collection of information about traffic interacting with your database, correlating this traffic with legitimate use and creating policies to prevent unauthorized access and offering prioritized response.

One big advantage of DAM is that it can nullify or at least partly minimize the risks due to human error. A hacker posing as a Verizon technician may not be provided access to the database if it were mapped for legitimate use. Similarly, an Android system that can compare hyperlinks with a real-time database of risky clicks will be able to prevent hackers from gaining ground among a lot of victims.

Besides building tools to intercept and minimize data loss due to human errors, technology can also help with teaching employees how to approach an unanticipated data security incident. When the stakeholders (the platform owner, the customers and the vendors) act in sync and according to pre-established protocol, any trail that does not align with the rest of the users can be tracked and access to it minimized before major database interceptions may be made.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

ai kids and their parents
How Cities Use AI to Improve Playground Design
Exclusive News
human resource data
The Integration of Employee Experience with Enterprise Data Tools
Big Data Exclusive
protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Big Data and the Enterprise CIO

4 Min Read
Image
Security

How Consumers Foot the Bill for Data Breaches

7 Min Read

Are You Securing Your Data Enough With Encryption and 2FA?

5 Min Read
data security unveiled
Security

Data Security Unveiled: Protecting Your Information in a Connected World

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?