Home > Improving Data Privacy in 2016

Improving Data Privacy in 2016

January 28 is Data Privacy Day (DPD). Observed since 2008, DPD brings awareness to the importance of data privacy and protection. According to the Verizon 2015 Data Breach Investigations Report, about 60% of cyber attackers are able to compromise an organization’s data within minutes. 2016 is going to be no different from a threats perspective, which means data thefts will happen. However, you can minimize the possibility of a cyberattack or data privacy incident by strengthening network security and following some simple security tips. Centralize monitoring and control: Continuously monitor your network and get a centralized view of the hundreds of security incidents happening in real-time. This is one of the most basic requirements if your organization is required to follow industry-standard compliance regulations like HIPAA, PCI DSS, etc. Embrace data-driven forensics: Data-driven analysis of a suspicious event will result in better root cause analysis and forensics. A suspicious event can be as trivial as an increase in Web traffic from a known host during specific non-business hours over the last seven days, or repeat connection requests to critical assets (servers, databases, etc.) from an unknown host outside the network. Considering the worst case scenario that an attack has happened, you must be able to trace it back to the source, establish an audit trail, and document the findings and the action taken. Watch out for malicious software: A term we may see more often in 2016 is ransomware. Sensitive data is the main driver behind these types of malicious software penetrating the network, and a regular user can become an unsuspecting victim of this attack, spreading it to other computers/applications inside the network. Though anti-virus and anti-malware software can be installed to protect the systems, you should set processes in place that will alert you to suspicious application and file activities. Also, you must consider the fact that subtle file and registry changes are hard to detect without file integrity monitoring tools, and zero-day malware attacks dwell on this advantage. Educate your users/colleagues: Patient records and credit card information are critical data. However, other data, such as social security numbers, ATM passwords, and bank account names stored on an unprotected desktop or document creates a prime opportunity for private data leaks. Period mailers and knowledge sharing among peers and with users can relatively improve your organization’s security. You can learn more about the Data Privacy Day here.
Narendran Vaideeswaran
Narendran Vaideeswaran
Naren Vaideeswaran is a product marketer and a technology enthusiast, and has been in the information technology space for over a decade. He started off…
Read more

Tweets

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

The future of IT lies in the cloud, but is this future still “cloud native”? Learn why this question is increasingl… t.co/6aOxFFWeD7

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

Considering a #multicloud strategy? Here’s what to consider before adopting. t.co/0lzaykD7SE via @vmblog

SolarWinds's Twitter avatar
SolarWinds
@solarwinds

@SteHollyoak We apologize for the inconvenience. Please DM us your contact information, and we'll escalate to the team. Thank you.