iHaveNet.com
A Game Plan for Protecting Stored Data | Technology
Online Breaking News Headlines Single Source to Headlines Breaking News Current Events Top Stories. Find out what is happening in News & the World. Check out iHaveNet.com for the latest news & current events articles plus Movie Reviews, Wolfgang Puck Recipes, NFL Previews Analysis and Politics. Your Single Source to News Articles, Current Events & Reviews.
  • HOME
  • WORLD
    • Africa
    • Asia Pacific
    • Balkans
    • Caucasas
    • Central Asia
    • Eastern Europe
    • Europe
    • Indian Subcontinent
    • Latin America
    • Middle East
    • North Africa
    • Scandinavia
    • Southeast Asia
    • United Kingdom
    • United States
    • Argentina
    • Australia
    • Austria
    • Benelux
    • Brazil
    • Canada
    • China
    • France
    • Germany
    • Greece
    • Hungary
    • India
    • Indonesia
    • Ireland
    • Israel
    • Italy
    • Japan
    • Korea
    • Mexico
    • New Zealand
    • Pakistan
    • Philippines
    • Poland
    • Russia
    • South Africa
    • Spain
    • Taiwan
    • Turkey
    • United States
  • USA
    • ECONOMICS
    • EDUCATION
    • ENVIRONMENT
    • FOREIGN POLICY
    • POLITICS
    • OPINION
    • TRADE
    • Atlanta
    • Baltimore
    • Bay Area
    • Boston
    • Chicago
    • Cleveland
    • DC Area
    • Dallas
    • Denver
    • Detroit
    • Houston
    • Los Angeles
    • Miami
    • New York
    • Philadelphia
    • Phoenix
    • Pittsburgh
    • Portland
    • San Diego
    • Seattle
    • Silicon Valley
    • Saint Louis
    • Tampa
    • Twin Cities
  • BUSINESS
    • FEATURES
    • eBUSINESS
    • HUMAN RESOURCES
    • MANAGEMENT
    • MARKETING
    • ENTREPRENEUR
    • SMALL BUSINESS
    • STOCK MARKETS
    • Agriculture
    • Airline
    • Auto
    • Beverage
    • Biotech
    • Book
    • Broadcast
    • Cable
    • Chemical
    • Clothing
    • Construction
    • Defense
    • Durable
    • Engineering
    • Electronics
    • Firearms
    • Food
    • Gaming
    • Healthcare
    • Hospitality
    • Leisure
    • Logistics
    • Metals
    • Mining
    • Movie
    • Music
    • Newspaper
    • Nondurable
    • Oil & Gas
    • Packaging
    • Pharmaceutic
    • Plastics
    • Real Estate
    • Retail
    • Shipping
    • Sports
    • Steelmaking
    • Textiles
    • Tobacco
    • Transportation
    • Travel
    • Utilities
  • WEALTH
    • CAREERS
    • INVESTING
    • PERSONAL FINANCE
    • REAL ESTATE
    • MARKETS
    • BUSINESS
  • STOCKS
    • ECONOMY
    • EMERGING MARKETS
    • STOCKS
    • FED WATCH
    • TECH STOCKS
    • BIOTECHS
    • COMMODITIES
    • MUTUAL FUNDS / ETFs
    • MERGERS / ACQUISITIONS
    • IPOs
    • 3M (MMM)
    • AT&T (T)
    • AIG (AIG)
    • Alcoa (AA)
    • Altria (MO)
    • American Express (AXP)
    • Apple (AAPL)
    • Bank of America (BAC)
    • Boeing (BA)
    • Caterpillar (CAT)
    • Chevron (CVX)
    • Cisco (CSCO)
    • Citigroup (C)
    • Coca Cola (KO)
    • Dell (DELL)
    • DuPont (DD)
    • Eastman Kodak (EK)
    • ExxonMobil (XOM)
    • FedEx (FDX)
    • General Electric (GE)
    • General Motors (GM)
    • Google (GOOG)
    • Hewlett-Packard (HPQ)
    • Home Depot (HD)
    • Honeywell (HON)
    • IBM (IBM)
    • Intel (INTC)
    • Int'l Paper (IP)
    • JP Morgan Chase (JPM)
    • J & J (JNJ)
    • McDonalds (MCD)
    • Merck (MRK)
    • Microsoft (MSFT)
    • P & G (PG)
    • United Tech (UTX)
    • Wal-Mart (WMT)
    • Walt Disney (DIS)
  • TECH
    • ADVANCED
    • FEATURES
    • INTERNET
    • INTERNET FEATURES
    • CYBERCULTURE
    • eCOMMERCE
    • mp3
    • SECURITY
    • GAMES
    • HANDHELD
    • SOFTWARE
    • PERSONAL
    • WIRELESS
  • HEALTH
    • AGING
    • ALTERNATIVE
    • AILMENTS
    • DRUGS
    • FITNESS
    • GENETICS
    • CHILDREN'S
    • MEN'S
    • WOMEN'S
  • LIFESTYLE
    • AUTOS
    • HOBBIES
    • EDUCATION
    • FAMILY
    • FASHION
    • FOOD
    • HOME DECOR
    • RELATIONSHIPS
    • PARENTING
    • PETS
    • TRAVEL
    • WOMEN
  • ENTERTAINMENT
    • BOOKS
    • TELEVISION
    • MUSIC
    • THE ARTS
    • MOVIES
    • CULTURE
  • SPORTS
    • BASEBALL
    • BASKETBALL
    • COLLEGES
    • FOOTBALL
    • GOLF
    • HOCKEY
    • OLYMPICS
    • SOCCER
    • TENNIS
  • Subscribe to RSS Feeds EMAIL ALERT Subscriptions from iHaveNet.com RSS
    • RSS | Politics
    • RSS | Recipes
    • RSS | NFL Football
    • RSS | Movie Reviews
A Game Plan for Protecting Stored Data
Tim Kridel

HOME > TECHNOLOGY

A Game Plan for Protecting Stored Data
A Game Plan for Protecting Stored Data

 

An effective data security policy is critical now more than ever, as data is increasingly stored in a variety of devices. But even though IT decision-makers put stringent security strategies in place to patch operating systems, secure the perimeters of the network and protect data, breaches are everyday news. The potential harm involved, in terms of negative press and financial losses, when companies lose laptops, backup tapes and other devices containing private information can be staggering.

To prevent theft of sensitive assets, it's critical to follow security best practices and adhere to a set data security policy.

Here's what to consider when creating one for your company.

Use the Right Technologies

As the Yankee Group has observed, storage networks are becoming more complex and have matured to the point of requiring additional perimeter and internal security services to ensure data integrity. In addition to encryption, IT decision-makers should consider implementing the following:

Access controls

Corporations must institute data security policies regarding who can access databases. Monitoring software is also key -- it helps track who has accessed data.

Filtering software

Tools from various vendors help you watch the way content is accessed -- via email, instant message and file transfer protocol (FTP), for example -- and inspect the content for policy violations. Some tools block or quarantine violations, and others offer the ability to block outbound email.

Put a Strategy in Place

To protect corporate data, your strategy should focus on physical access controls, data network transport protection, host defenses, and system and application authorization, says Rich Mogull, director of research for the Gartner Group.

In addition, you should perform regular audits of your security practices. You should also establish a specific policy for protecting data, data management, backup and audit frequency. It is important too to consider internal access to corporate data: Gartner estimates that 70 percent of security incidents that cause loss involve insiders.

Determine How the Data Should Be Protected

Extremely sensitive data, such as confidential customer information and credit card numbers, should be encrypted before being designated for storage. Not all data must be encrypted, however, according to Mogull. “Use encryption to protect only data that moves physically or electronically, or to enforce segregation of duties for administrators -- for example, encrypting credit card numbers in a database to prevent database administrators from seeing them," he says.

Ensure Compliance

Companies in certain industries, such as health care, must ensure that their data backup, storage and recovery policies comply with government regulations. The Gramm-Leach-Billey Act and the Health Insurance Portability and Accountability Act (HIPAA) require more stringent corporate governance and controls. The Sarbanes-Oxley Act requires corporations to be financially accountable; it doesn't specify the amount of time specific data should be stored or how, but because it does require integrity of data, it motivates IT executives to determine their own policies and be more vigilant about backing up and storing corporate information.

SocialTwist Tell-a-Friend

 

  • The New Mobile Landscape
  • Is Free Public Wi-Fi Safe?
  • Keep Your Data Safe When Telecommuting
  • Security Issues for Multicore Processors
  • How to Reduce Smartphone Security Risks
  • Are You Too Snarky Online?
  • Who's Gawking at Your Photos?
  • Is Social Media a Waste of Time?
  • 5 New Ways to Feed Your Online Addiction
  • Investors Increasingly Tap Social Media for Stock Tips
  • McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
  • A Game Plan for Protecting Stored Data
  • Think Big When It Comes to Data Breaches
  • Information Security MBA's Teach Business Side of Cybersecurity
  • Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
  • FBI Wants to Monitor Social Media for 'Emerging Threats'
  • Youth on the Web: Reason? Who Needs a Reason
  • Google Unveils 'Find My Face' Recognition Tool
  • Why Investors Should Keep Their Eyes on the Cloud
  • 10 Ways to Stay Safe While Shopping Online
  • Take Advantage of Free Shipping Deals This Holiday Season
  • Online Shopping Deals Hurt State Budgets
  • Tips for Shopping With Your Smartphone
  • Seven Rules of Successful Bloggers
  • Twitter Redesigns Site, Aims for Simplicity
  • 3 Ways to Use Foursquare to Connect With Your College
  • United States Reacts to Indian Government's Efforts to Censure Online Content
  • Will Apple Be the Same Without Steve Jobs?
  • Steve Jobs: 6 Secrets of Success
  • Open Clouds
  • The Cloud: A Security Solution for Small Business
  • 4 Twitter Tips for Business Success
  • Twitter: How to Tweet to Get Results
  • 3 Sneaky New Online Scams to Avoid

 

Copyright © 2012 Studio One Networks. All rights reserved.

Webroot

Search Powered By Google

Google Search   

Job & Career Search

career & job search                    job title, keywords, company, location

ADVERTISEMENT

Advertisement

IT & Technology Jobs

Technology Jobs

IT Jobs

ADVERTISEMENT

Advertisement

  • HOME
  • WORLD
  • USA
  • BUSINESS
  • WEALTH
  • STOCKS
  • TECH
  • HEALTH
  • LIFESTYLE
  • ENTERTAINMENT
  • SPORTS

 

  • Services:
  • RSS Feeds
  • Shopping
  • Email Alerts
  • Site Map
  • Privacy