Preview

5 Ways to Avoid a Costly Data Security Breach

Good Essays
Open Document
Open Document
823 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
5 Ways to Avoid a Costly Data Security Breach
One of the most common responses I get from small-business owners when I talk to them about data security goes something like this: "Who would want to steal anything from us? It's not like we're the NSA."

The hard truth is that any business is a target for bad guys. Just like any home can get robbed, any car can get stolen, and any eBay account can get hacked. It doesn't matter what kind of business you're in. You are vulnerable. * * Startup Books * Free Trade Magazines * Classifieds * Trade Journals * Entrepreneur Press * Encyclopedia * Slideshows * Get the Magazine

Home > Technology > Managing Technology > 5 Ways to Avoid a Costly Data Security Breach
5 Ways to Avoid a Costly Data Security Breach
Security tips from the FCC for protecting your digital and physical files
From Business on Main | April 30, 2010
Print Email Share Get the Mag Weekly Updates [-] Text Size [+]
Recent Articles
By Business on Main

* 5 Ways to Avoid a Costly Data Security Breach * Know Your Sales Margins * Moving Your Business Out of the House * Deciphering Your Website Traffic Reports: 5 Tips * Secrets of a Mobile Office * See all articles »

Business on MainBy Dan Briody

One of the most common responses I get from small-business owners when I talk to them about data security goes something like this: "Who would want to steal anything from us? It's not like we're the NSA."

The hard truth is that any business is a target for bad guys. Just like any home can get robbed, any car can get stolen, and any eBay account can get hacked. It doesn't matter what kind of business you're in. You are vulnerable.

Content Continues Below

Especially now. Because every business is connected to a network in some way, it means that one bad apple can test the security of thousands of businesses--all with the push of a button.

And these breaches can be costly. Ponemon Institute is an independent

You May Also Find These Documents Helpful

  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    Chan, Sally, and Stan Lepeak. "IT and Sarbanes-Oxley." CMA Management 78.4 (2004): 33(4). P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    To begin with, small businesses are becoming a main focus by hackers. One main reason is small business do not believe it can happen to them because of all the big business that are out there serving a similar customer. When small businesses go electronic the main focus is not cyber security. One reason why is due to the income level of the business. Most small businesses are even taking a financial leap of faith, when going electronic connecting there business to the internet. Often times small businesses are gambling on if they have enough customers to go beyond a credit card machine let alone internet visibility, due to cost of website maintenance and website security, while keeping a store location up and running.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Snowden's Case Summary

    • 520 Words
    • 3 Pages

    Some of these changes were costly and out of the realm of possibility for small businesses. However, many of the changes all business can easily apply to their organizations. With a defense in depth approach against insider threats, businesses can apply measures to protect their data and…

    • 520 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: LLC, P. I. (2009). "How Global Organizations Approach the Challenge of Protecting Personal Data." (privacy): 32.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Internet Ethics

    • 1639 Words
    • 7 Pages

    The internet is a global network of networks using universal standards to connect millions of different networks (Laudon & Laudon, 2012). With millions of people trafficking the networks everyday it is virtually impossible to monitor all unethical behaviors. Throughout the internet there are people who are publishing false information, using fake identification, hacking accounts for financial benefits, or countless other criminal acts and there is no way of stopping all of them. The internet is open to everyone and a lot of these modern businesses can’t function without it. A lot of the problems dealt in the internet aren't solely on business users but anyone who has access to internet, so whatever affects the casual user defiantly affects the business user.…

    • 1639 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Ubiquitous Computing and Your Privacy INF 103 Week 3 Discussion 1 Cite and explain examples that support and argue against the statement made by Scott McNealy, founder of Sun Microsystems, “You have zero privacy anyway. Get over it.”…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Crime Law

    • 1863 Words
    • 8 Pages

    As economics and business students, you are already aware that cybercrime works to prejudice ecommerce. Companies with online operations are subject to credit card fraud, identity theft, phishing, and intellectual property crimes. Cybercriminals continue to negatively impact ecommerce.…

    • 1863 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    Problem Statement The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Best Essays

    Term Paper

    • 3364 Words
    • 14 Pages

    Breakthroughs in data storage, streaming, and ease of information access have become the driving force that enables data to be transferred across the globe within seconds with a simple button click. The ease of access for media has allowed companies to sell their products all over the globe and open up their businesses to consumers that may not have been reached through the typical brick and mortar store. With advancements in technology also comes the advancement of data theft.…

    • 3364 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Literature Review

    • 657 Words
    • 2 Pages

    Data breaches is a term that our society is becoming all too familiar with. They have been occurring more often throughout the past couple of years. An article titled “Data Breaches Keep Privacy & Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor (2012) states “those in the business of cybercrime and protecting against cybercrime may think of 2011 as the year of the breach.”(p. 2) Cyber security has always been a big issue but the more breaches there were the more serious of an issue it became. In 2011 these data breaches affected huge companies and corporations such as Citigroup, Lockheed Martin and many others. The article discusses that it is hard to know whether these data breaches were being done from the inside or not. Not being able to determine the source of these major leaks is a scary thought. These breaches affect more than just the company and the people directly involved. Consumers and investors are going to be turned away from companies that are having security issues and as the article states, lawyers are being kept very busy.…

    • 657 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Securing and Protecting Information Andrew Truxton CMGT 400 November 24, 2014 Romel Llarena Securing and Protecting Information…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    pubpolessay

    • 632 Words
    • 2 Pages

    Naama Gouti Security Data Breach Notification Laws From afar, the data breach notification system may seem wholesome, however look a bit closer and you will find many insufficiencies made up of inconsistent state data breach laws that compose our nation’s standard defense against data breaches. The inconsistencies in state data breach laws cause insufficient protection of citizens, unnecessary complexities for businesses, and de-facto national requirements. Data breaches cause corporations millions of dollars and is one of the fastest growing crimes committed. For instance, California is witnessing identity theft as one of the fastest growing crimes committed. In 2000, the Los Angeles County Sheriff’s Department reported 1,932 identity theft cases, which was a 108 percent increase from the previous year. After a large amount of customer databases containing personal information were breached, security data breach notification laws were enacted by most American states since 2002. Specifically, the first security breach notification law introduced by California State Senator Peace on February 12, 2002 was law Senate Bill No. 1386 (“SB 1386”) in the state of California; it was passed unanimously by the California Senate and Assembly and it became effective July 1, 2003. Since most states follow California’s security breach laws and California is leading the nations effort in security data breach laws, I will be discussing California’s data laws in further detail, as this will focus in on issues regarding data laws in general. SB 1386 requires any company that stores its customer’s unencrypted date electronically to notify the customers if a security breach has taken place or if they have reason to believe that unencrypted date has been stolen. As defined by California’s law, personal information “includes any user name or email address, in combination with a password or security question and answer that would permit access to an online account [as well as medical…

    • 632 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technology and Risks

    • 775 Words
    • 3 Pages

    Data theft is not limited to consumers; there have been numerous reports of security breaches within major cooperations. It is almost impossible to think a large company can be a victim of hacking. The truth of the matter is in 2000 major companies such as H & R Block, E-Trade and Western Union all had their information systems hacked exposing the personal information of its customers. (Greenstein, 2002)…

    • 775 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Securing and Protecting Information CMGT/400 Iwona Rusin July 6th, 2015 Brandon Smith This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative measures, and some devices that will be helpful when setting up a secure system.…

    • 1446 Words
    • 4 Pages
    Better Essays