Closing Security Gaps: Introducing the Pressure Incentive

Report this content

IT Connection Blog by Amy Larsen DeCarlo

Summary Bullets:

  • For all the talk about sophisticated security strategies, too many breaches can be avoided by making sure the basics are under control, starting with adequate data security policies.
  • The recent breaches of Global Payments and LinkedIn’s data cast a harsh light on the lack of care those organizations took to applying appropriate protections such as multi-factor authentication and encryption to safeguard customer data.

One unfortunately consistent truth about data security is how often some of the most egregious data breaches could have been stopped if adequate care was taken to ensure the most fundamental elements of security are in place, starting with the appropriate policies regarding the handling of crucial customer data.  We have seen this recently with attacks such as the theft of hundreds of thousands of patient records from Utah’s Medicaid health system in March (see “Anatomy of a Breach: What We All Can Learn from the Utah Medicaid Records Theft,” May 18, 2012), where a cascading series of clear missteps in policy and execution made the breach relatively easy for hackers. Read more of this post at http://bit.ly/Laz24s

Media Contact:

Amee Singh
Sr. Director, Marketing Communications
pr@currentanalysis.com 

About IT Connection

IT Connection is the premier source of unbiased analysis and assessments of IT equipment and telecom services.  IT Connection provides easy-to-access, cost-effective, non-vendor-sponsored research to enterprise IT professionals.  The assessments on IT Connection allow you to quickly, easily, and efficiently assess suppliers, access side-by-side product comparisons, determine the best technology solution to fit your needs, and receive real-time updates and analysis on breaking market-changing events.  To join our community and interact with your peers and our analysts, visit us at www.currentanalysis.com/ITC.

About Current Analysis

Current Analysis (http://www.currentanalysis.com) has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business. Current Analysis is the only provider of continuous, in-depth tactical competitive intelligence, analysis, and advice. For more than 15 years, sales teams, product managers, marketing professionals, and executives have relied on Current Analysis as a trusted partner to improve their ability to anticipate and quickly take action on market opportunities and competitive threats. The company serves more than 35,000 professionals at over 1,600 global enterprises.

Tags:

Documents & Links

Quick facts

For all the talk about sophisticated security strategies, too many breaches can be avoided by making sure the basics are under control, starting with adequate data security policies.
Tweet this
The recent breaches of Global Payments and LinkedIn’s data cast a harsh light on the lack of care those organizations took to applying appropriate protections such as multi-factor authentication and encryption to safeguard customer data.
Tweet this