Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics and truck accident claims
    How Data Analytics Reduces Truck Accidents and Speeds Up Claims
    7 Min Read
    predictive analytics for interior designers
    Interior Designers Boost Profits with Predictive Analytics
    8 Min Read
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Data Security – Why Your Investments May Not Be Enough
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Data Security – Why Your Investments May Not Be Enough
Security

Data Security – Why Your Investments May Not Be Enough

Anand
Anand
5 Min Read
SHARE

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data.

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data. The audit report concludes its assessment by noting that “although IRS has continued to make progress in addressing information security control weaknesses, it had not always effectively implemented access and other controls to protect the confidentiality, integrity, and availability of its financial systems and information.”

The GAO report should find resonance not only among the Government circles, but also among enterprise businesses that continue to fall prey to the latest cyber-hacking attempts. Some independent reports estimate that businesses lose as much as $400 billion each year due to hackers. Despite an increasing focus on data storage and access standards across organizations, security has remained a cat and mouse game where hackers continue to win on a fairly routine basis.

So why aren’t the increasing investments in data security not showing results? One of the major reasons is that a lot of cyber-hacking incidents involve an element of human gullibility. Take the instance of CIA Director John Brennan losing his AOL account to hackers – it involved the hackers posing as Verizon technicians to gather confidential details regarding the victim. Or, the latest revelations about how an embedded chip could be used to bypass security scans and exploiting Android devices – this exploit will not work unless the victim clicks on a link distributed by the hacker. In each of these cases, a momentary lapse of judgement is primarily how hackers gain entry into confidential systems.

More Read

nature of proxy servers
Understanding The Nature Of Proxy Servers In The Big Data Age
Cybercrime: could tokenization and blockchain help end data theft?
6 Essential Practices For Data Security With Remote Working
Genesco Sues Visa Over PCI Noncompliance Fines
The Role of Artificial Intelligence in Enhancing Data Security

Overcoming human gullibility is surely one of the biggest challenges to security professionals and this is not going away anytime soon. However, the loss due to this can be minimized through appropriate investments in data security. One area that has been gaining ground here is data monitoring. Databases Activity Monitoring (DAM) tools are today a part of legal compliance and it involves automating the collection of information about traffic interacting with your database, correlating this traffic with legitimate use and creating policies to prevent unauthorized access and offering prioritized response.

One big advantage of DAM is that it can nullify or at least partly minimize the risks due to human error. A hacker posing as a Verizon technician may not be provided access to the database if it were mapped for legitimate use. Similarly, an Android system that can compare hyperlinks with a real-time database of risky clicks will be able to prevent hackers from gaining ground among a lot of victims.

Besides building tools to intercept and minimize data loss due to human errors, technology can also help with teaching employees how to approach an unanticipated data security incident. When the stakeholders (the platform owner, the customers and the vendors) act in sync and according to pre-established protocol, any trail that does not align with the rest of the users can be tracked and access to it minimized before major database interceptions may be made.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

AI supply chain
AI Tools Are Strengthening Global Supply Chains
Artificial Intelligence Exclusive
data analytics and truck accident claims
How Data Analytics Reduces Truck Accidents and Speeds Up Claims
Analytics Big Data Exclusive
predictive analytics for interior designers
Interior Designers Boost Profits with Predictive Analytics
Analytics Exclusive Predictive Analytics
big data and cybercrime
Stopping Lateral Movement in a Data-Heavy, Edge-First World
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

mobile BI security
Business IntelligenceITMobilitySecurity

Mobile Security Critical for BI

4 Min Read
byod and big data
Big DataITSecurity

Is BYOD Stealing the Big Data Limelight?

5 Min Read

Attention Retailers: How to Avoid Being Attacked

17 Min Read
identity theft and data breach
Security

Big Data is Both a Weapon and Liability with Identity Theft

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?