Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Data Security – Why Your Investments May Not Be Enough
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Data Security – Why Your Investments May Not Be Enough
Security

Data Security – Why Your Investments May Not Be Enough

Anand
Anand
5 Min Read
SHARE

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data.

The 2015 hacking of the IRS database that gave criminals access to details of more than 700,000 tax payers in the United States raised several questions regarding the way cyber-security was handled by the government. According to the latest audit reports released by the Government Accountability Office, the IRS still lacks a number of important database controls to identify and authenticate users through password settings, restrict server access and encrypt data. The audit report concludes its assessment by noting that “although IRS has continued to make progress in addressing information security control weaknesses, it had not always effectively implemented access and other controls to protect the confidentiality, integrity, and availability of its financial systems and information.”

The GAO report should find resonance not only among the Government circles, but also among enterprise businesses that continue to fall prey to the latest cyber-hacking attempts. Some independent reports estimate that businesses lose as much as $400 billion each year due to hackers. Despite an increasing focus on data storage and access standards across organizations, security has remained a cat and mouse game where hackers continue to win on a fairly routine basis.

So why aren’t the increasing investments in data security not showing results? One of the major reasons is that a lot of cyber-hacking incidents involve an element of human gullibility. Take the instance of CIA Director John Brennan losing his AOL account to hackers – it involved the hackers posing as Verizon technicians to gather confidential details regarding the victim. Or, the latest revelations about how an embedded chip could be used to bypass security scans and exploiting Android devices – this exploit will not work unless the victim clicks on a link distributed by the hacker. In each of these cases, a momentary lapse of judgement is primarily how hackers gain entry into confidential systems.

More Read

Online Tech Speaks at Data Security Seminar
Gartner Survey: 98% of Brands Are Negligent with Big Data Security
The Use and Abuse of Big Data
Malicious Tool Provides Attackers with a New Type of Zombies
Is Your Data At Risk? Here’s How To Protect Your Information Online

Overcoming human gullibility is surely one of the biggest challenges to security professionals and this is not going away anytime soon. However, the loss due to this can be minimized through appropriate investments in data security. One area that has been gaining ground here is data monitoring. Databases Activity Monitoring (DAM) tools are today a part of legal compliance and it involves automating the collection of information about traffic interacting with your database, correlating this traffic with legitimate use and creating policies to prevent unauthorized access and offering prioritized response.

One big advantage of DAM is that it can nullify or at least partly minimize the risks due to human error. A hacker posing as a Verizon technician may not be provided access to the database if it were mapped for legitimate use. Similarly, an Android system that can compare hyperlinks with a real-time database of risky clicks will be able to prevent hackers from gaining ground among a lot of victims.

Besides building tools to intercept and minimize data loss due to human errors, technology can also help with teaching employees how to approach an unanticipated data security incident. When the stakeholders (the platform owner, the customers and the vendors) act in sync and according to pre-established protocol, any trail that does not align with the rest of the users can be tracked and access to it minimized before major database interceptions may be made.

Share This Article
Facebook Pinterest LinkedIn
Share
ByAnand
Follow:
Anand Srinivasan is the founder of Hubbion, a suite of business apps. The Hubbion Project Management app was ranked among the top 20 in its category for 2017 by Capterra.

Follow us on Facebook

Latest News

Hidden AI, a risk?
Hidden AI, Real Risk: A Governance Roadmap For Mid-Market Organizations
Artificial Intelligence Exclusive Infographic
unusual trading activity
Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
Analytics Exclusive Infographic
Ai agents
AI Agent Trends Shaping Data-Driven Businesses
Artificial Intelligence Exclusive Infographic
Why Businesses Are Using Data to Rethink Office Operations
Why Businesses Are Using Data to Rethink Office Operations
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

defense industrial base
Security

Ransomware And The Defense Industrial Base

6 Min Read

Top 5 criteria to consider in a data protection provider

5 Min Read
big data and industry 4.0
Big DataExclusivePrivacySecurity

Big Data Challenges Of Industry 4.0 Worth Considering

7 Min Read

Adopting a User Behavior Analytics (UBA) Solution

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?