Friday, May 17, 2024

Better Data Security: Five Guidelines

Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

With hackers growing ever more sophisticated, fully protecting your data is that much more difficult. The following guidelines are based on a recent report by Ernst & Young.

It is time to rethink information security programs and strategies to keep your company’s most valuable assets safe, according to Information Security in a Borderless World, a report released today by Ernst & Young LLP.

“Advancing technology, including cloud computing, social media and mobile devices, creates far too much access to information to rely on traditional barricades,” said Bernie Wedge, Americas Information Technology Risk and Assurance leader, in a statement. “Even internal employee emails have become a target by external hackers. Traditional security models no longer work in this borderless world. Companies need to embrace change in their security programs in order to thwart both external hackers and threats that arise with new technologies in their own organizations.”

Building on the findings from Ernst & Young’s 2010 Global Information Security Survey, the report proposes five interlocking phases of a transformational information security strategy to earn trust in a borderless world. It details specific opportunities for companies to achieve each action, including:

1. Identify the real risks – Define the organization’s risk appetite, identify the most important information and applications, where they reside and who has access to them, and assess threats and develop predictive models.

2. Protect what matters most – Focus on business drivers and high-value data, assume breaches will occur and improve processes, balance fundamentals with emerging threat management, and establish access control models.

Read more about data protection guidelines at eSecurity Planet.

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Similar articles

Get the Free Newsletter!

Subscribe to Data Insider for top news, trends & analysis

Latest Articles