Forget the hacker from Belarus. He can wreak havoc with your system if he gets in, but most companies are on their guard against such maliciousness. But few companies appear to be ready to handle inside breaches.
What about that database services vendor to whom you have been shipping all your information? Or what about those database administrators you trust with your vital assets? Or those development teams that are using live data in their test beds? Or the staff at your disaster recovery site on the other side of the state? What guarantees do you have that they are handling sensitive data in a prudent manner? Are you monitoring what they are doing with your data?
If you check out the latest
I just wrapped up a
As Roxana explained it, there are three modes of data security: prevention, detection and recovery. In my presentation, we covered the results of a survey of 316 IOUG members, conducted by Unisphere Research for IOUG and Oracle that looked at the state of prevention and detection within the industry.
Essentially, there was a marked reduction in data security initiatives since the last survey was conducted last year at this time. This is attributable to tight IT budgets and spending as a result of the turbulent economy, and this has repercussions across organizations' efforts to lock down their data assets.
The survey uncovered the following issues:
• Data security spending slowed dramatically over the past year
• More data is being sent to off-site third parties
• Less data is being encrypted
• Fewer databases are being monitored for breaches or unusual activity
• More backed-up data is going offsite unencrypted
• Organizations are not paying enough attention to what privileged users are doing when they working within databases
Organizations need to encrypt or mask sensitive data that leaves production environments, and it doesn't matter if it's going down the hall or across the world to an offshore site. Plus, as the maxim goes, they need to “trust, but verify” the activities of their most trusted users. Prevention of data breaches at these levels is worth a pound of cure.
Joe McKendrick is an author, consultant, blogger and frequent INN contributor specializing in information technology. He can be reached at joe@mckendrickresearch.com.
The opinions of bloggers on