SHARE
Facebook X Pinterest WhatsApp

Better Data Security: Five Guidelines

With hackers growing ever more sophisticated, fully protecting your data is that much more difficult. The following guidelines are based on a recent report by Ernst & Young. It is time to rethink information security programs and strategies to keep your company’s most valuable assets safe, according to Information Security in a Borderless World, a […]

Apr 21, 2011
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

With hackers growing ever more sophisticated, fully protecting your data is that much more difficult. The following guidelines are based on a recent report by Ernst & Young.

It is time to rethink information security programs and strategies to keep your company’s most valuable assets safe, according to Information Security in a Borderless World, a report released today by Ernst & Young LLP.

“Advancing technology, including cloud computing, social media and mobile devices, creates far too much access to information to rely on traditional barricades,” said Bernie Wedge, Americas Information Technology Risk and Assurance leader, in a statement. “Even internal employee emails have become a target by external hackers. Traditional security models no longer work in this borderless world. Companies need to embrace change in their security programs in order to thwart both external hackers and threats that arise with new technologies in their own organizations.”

Building on the findings from Ernst & Young’s 2010 Global Information Security Survey, the report proposes five interlocking phases of a transformational information security strategy to earn trust in a borderless world. It details specific opportunities for companies to achieve each action, including:

1. Identify the real risks – Define the organization’s risk appetite, identify the most important information and applications, where they reside and who has access to them, and assess threats and develop predictive models.

2. Protect what matters most – Focus on business drivers and high-value data, assume breaches will occur and improve processes, balance fundamentals with emerging threat management, and establish access control models.

Read more about data protection guidelines at eSecurity Planet.

  SEE ALL
ARTICLES
 

Recommended for you...

OpenAI Atlas Browser Security Flaw Lets Hackers Attack
Datamation Staff
Oct 28, 2025
Controversial UN Cybercrime Treaty Signed by 65 Countries
Datamation Staff
Oct 27, 2025
Critical WatchGuard VPN Bug Lets Hackers Control Networks
Datamation Staff
Oct 20, 2025
North Korean Hackers Deploy 338 Malicious NPM Packages
Datamation Staff
Oct 14, 2025
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.