The Verge

US gives Huawei another 90 days before full ban takes effect

The United States will once again delay a full ban on doing business with Huawei, saying that rural communications companies needed the extra time to switch their equipment away from products made by the Chinese tech giant. President Trump initiated the Huawei ban in May with an
/
John Pientka

Are They Here?

Have you noticed how “open” our government has suddenly become about its secret program for researching UFOs or our Navy’s encounters with them tracking our fleet? Are we being prepared for something? End of summer, it’s time for something more light hearted. In the movie
/

Data Violations – Record Year For Data Breaches

Record Year For Data Breaches

The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and last month Ars Technica discussed in detail the information breach at the U.S. Government’s Office of Personnel Management. MSPmentor‘s current IT security news includes the hacking of databases at Harvard, a data breach discovered at Orlando Health, and 85,000 compromised debit and credit cards during the FireKeepers Casino data breach. Non-profit identity theft organization ITRC reported 400 data breaches this year as of June 30 and believes 2015 could top the charts for data violations.

report-breaches

See The Full Report

As if you didn’t have more important things to worry about – so here’s a quick look at how to stay ahead.

The Risks

  • Access control and authentication: are you certain only the necessary people have access to relevant data at all times?
  • Terms and conditions: are the standards of your service providers equal to those your organization maintains? And how secure are your own standards?
  • Virtualization technology: what are the security guarantees? How accessible are the services offered?
  • Data privacy: strict security measures need to be in place ensuring responsible data management, and industry and regulation compliance.

Security Strategies

  • Transparency: choose service providers that adhere to industry standards, provide clear service and product details, and have open lines of communication.
  • Drills: be sure to test for possible security holes, and plan for breaches. Just as you would prepare for physical risks such as fires, put emergency tests and procedures in place to counter data threats.
  • Backup: always have a backup. Do it now.
  • Diversify: minimize your risk by spreading data over localized and cloud servers; scatter service provider usage where possible.
  • Education: train yourself and your employees on security threats and defenses. Try to be proactive and keep up with the constantly-evolving environment.
  • Data tracking: understanding data-centric security tools helps maintain sensitive data and ensures you’re the first to know should something go wrong.
  • Policies in place: governance policies are essential and should be clearly established to safeguard data privacy. Data sensitivity classification helps apply the correct security techniques to relevant data sets.
  • Encryption: never store encryption keys in the software or with your data, and be certain that strong encryption techniques are being used. Always remember that data being used is also vulnerable, so take steps to ensure secure handling.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

5 Recommendations for Effective Governance, Risk and Compliance Management

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within ...
Steve Prentice CloudTweaks

Thought Leaders

CLOUDHUBS: OPTIMIZING APPLICATION PERFORMANCE It may seem hard to believe, but even in this day and age, there are still some enterprises that are cloud-averse ...
Steve Prentice CloudTweaks

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to ...
WordPress Managed Hosting Services

WordPress Managed Hosting Services

Managed WordPress Hosting Services WordPress hosting services has exploded in popularity as a blogging tool and content management system in recent years, and is now ...
AWS

AWS IoT Core Adds the Ability to Configure Quality of Service (QoS) for Republish Action

/
Starting today, AWS IoT Core customers can configure the quality of service (QoS) when publishing messages via the republish action of a topic rule. AWS IoT Core supports QoS levels ...
John Pientka

Are They Here?

/
Have you noticed how “open” our government has suddenly become about its secret program for researching UFOs or our Navy’s encounters with them tracking our fleet? Are we being prepared ...
Door Dash

DoorDash reveals details of its new tipping model

/
DoorDash announced last month that it would be changing its controversial tipping model. Today it’s revealing the basics of how the new system will work. Under the past model, Dashers ...