Defending Against Data Breach: Developing the Right Encryption Strategy

Compliance / Privacy
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Given the cost to both companies and customers, it's critical that IT teams develop a solid strategy utilizing the most effective tools available to help avoid a breach.

 

Editor's Note: This article is an extract of the white paper "Defending Against Data Breach: Developing the Right Encryption Strategy" available for free download from the MC White Paper Center.

 

No matter how secure your information systems appear, and no matter how confident your IT staff may be, the risks of your company experiencing a data breach are real, and they continue to grow daily.

 

Information security breaches cost companies millions of dollars each year, and incidents continue to rise. While government and industry regulations have been implemented that penalize the company if their sensitive data is compromised, protecting against the threat of data breach is difficult. Take, for example, the multiple ways unauthorized access can occur: theft of portable devices, lost paper files and external storage devices, improper access by employees, network infiltration from outside entities, and more.

 

Data breach incidents are not a temporary statistical aberration, but instead represent a growing epidemic. Given the cost to both companies and their customers, it's critical that IT teams develop a solid strategy that utilizes the most effective tools.

 

This article and associated white paper have several objectives:

 

  • Examine the problems that create a higher risk for data breach
  • Explore the regulatory landscape
  • Describe the technical hurdles facing both management and IT
  • Demonstrate how the right data encryption technologies can reduce the exposure of data theft without hampering efficient work flow

 

Most importantly, this article and white paper offer recommendations for how IT management can deploy strong security technologies to encrypt, monitor, and audit the access and use of sensitive information within an organization's systems.

Data Breaches Wreak Havoc

According to the most recent estimates published by the Ponemon Institute's 2010 Annual Study, "U.S. Cost of Data Breach," the average corporation that suffers a data breach will pay $7.2 million to resolve the issue. That's about $214 per record to cover legal fees, the cost of notifying each affected person, regulatory fines, lost employee productivity, stock price dips, and indirect customer losses.

 

To learn more, download the white paper "Defending Against Data Breach:

Developing the Right Encryption Strategy" available for free download from the MC White Paper Center.

 

 

Thomas Stockwell

Thomas M. Stockwell is an independent IT analyst and writer. He is the former Editor in Chief of MC Press Online and Midrange Computing magazine and has over 20 years of experience as a programmer, systems engineer, IT director, industry analyst, author, speaker, consultant, and editor.  

 

Tom works from his home in the Napa Valley in California. He can be reached at ITincendiary.com.

 

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: