of Data Security
Defend Against New Risks
In the Sophos Data Security Report 2011, there were several notable points to mention, and following is one: “Fortunately, it’s much less expensive to prevent a beach or other data loss incident, than it is to respond to one and resolve it after the fact”.
It seems the golden rule is to manage your information risks first and “…according to security expert Rebecca Herold, you’ll cover roughly 85 to 90% of compliance regulations if you practice effective protection.”
Once you have and understand your information risks the rest is handled through a detailed list of activities that will be adhered to. Here is a list found in the Sophos Data Security Report 2011:
- Know what you have
- Know what your employees have, and also what they access
- Know where valuable data is kept
- Know what to collect, what to keep and not to keep
- Limit access
- Put in place appropriate safeguards
There exist a common thread between managing enterprise information networks security and consumer’s PCs, mobile and digital devices as the recognized weak link in information security…Human behavior.
Human behavior means human mistakes. Enterprise has its challenges with what is called, the “Consumerization of IT, not unlike the challenges of children, parents, and educators, with the “Consumerization of Anonymity” in a mobile media digital age.
Digital natives, and possibly future Enterprise ITs, have never experienced growing up in a time before the Internet. However, today the adolescent digital natives may know the technology they are dealing with; however, many times they do not have a clue with whom they are dealing with.
Trusted adults need to understand how important his or her conversations are with kids about understanding best practices for living a secure digital life. It is vital that we maintain an open and continuous communication with our tech savvy children while their maturity and wisdom catch to complement their tech savvy abilities and ultimately to develop future responsible cybercitizens.
Like the Enterprise IT security information specialist and today’s digital parent, you must recognize how your data can be vulnerable with the onslaught of unprotected data on mobile devices and social media sites. Both Enterprise and parents face new legal issues and compliance issues and need to identify strategies to keep safe and compliant.
Your CyberHood Watch Partner,
david c ballard
Radio Security Journalist