Better Data Security: Five Guidelines

Based on an Ernst & Young’s 2010 Global Information Security Survey.


How to Help Your Business Become an AI Early Adopter


With hackers growing ever more sophisticated, fully protecting your data is that much more difficult. The following guidelines are based on a recent report by Ernst & Young.

It is time to rethink information security programs and strategies to keep your company's most valuable assets safe, according to Information Security in a Borderless World, a report released today by Ernst & Young LLP.

“Advancing technology, including cloud computing, social media and mobile devices, creates far too much access to information to rely on traditional barricades,” said Bernie Wedge, Americas Information Technology Risk and Assurance leader, in a statement. “Even internal employee emails have become a target by external hackers. Traditional security models no longer work in this borderless world. Companies need to embrace change in their security programs in order to thwart both external hackers and threats that arise with new technologies in their own organizations.”

Building on the findings from Ernst & Young’s 2010 Global Information Security Survey, the report proposes five interlocking phases of a transformational information security strategy to earn trust in a borderless world. It details specific opportunities for companies to achieve each action, including:

1. Identify the real risks - Define the organization’s risk appetite, identify the most important information and applications, where they reside and who has access to them, and assess threats and develop predictive models.

2. Protect what matters most - Focus on business drivers and high-value data, assume breaches will occur and improve processes, balance fundamentals with emerging threat management, and establish access control models.

Read more about data protection guidelines at eSecurity Planet.

Tags: data protection, data security, Data Protection Service Management, Ernst & Young

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.