Preview

5 Ways to Avoid a Costly Data Security Breach

Good Essays
Open Document
Open Document
823 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
5 Ways to Avoid a Costly Data Security Breach
One of the most common responses I get from small-business owners when I talk to them about data security goes something like this: "Who would want to steal anything from us? It's not like we're the NSA."

The hard truth is that any business is a target for bad guys. Just like any home can get robbed, any car can get stolen, and any eBay account can get hacked. It doesn't matter what kind of business you're in. You are vulnerable. * * Startup Books * Free Trade Magazines * Classifieds * Trade Journals * Entrepreneur Press * Encyclopedia * Slideshows * Get the Magazine

Home > Technology > Managing Technology > 5 Ways to Avoid a Costly Data Security Breach
5 Ways to Avoid a Costly Data Security Breach
Security tips from the FCC for protecting your digital and physical files
From Business on Main | April 30, 2010
Print Email Share Get the Mag Weekly Updates [-] Text Size [+]
Recent Articles
By Business on Main

* 5 Ways to Avoid a Costly Data Security Breach * Know Your Sales Margins * Moving Your Business Out of the House * Deciphering Your Website Traffic Reports: 5 Tips * Secrets of a Mobile Office * See all articles »

Business on MainBy Dan Briody

One of the most common responses I get from small-business owners when I talk to them about data security goes something like this: "Who would want to steal anything from us? It's not like we're the NSA."

The hard truth is that any business is a target for bad guys. Just like any home can get robbed, any car can get stolen, and any eBay account can get hacked. It doesn't matter what kind of business you're in. You are vulnerable.

Content Continues Below

Especially now. Because every business is connected to a network in some way, it means that one bad apple can test the security of thousands of businesses--all with the push of a button.

And these breaches can be costly. Ponemon Institute is an independent

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    5. Customer privacy data and intellectual property assets are critical because they hold personal information that can pose a potential threat if exposed.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    To begin with, small businesses are becoming a main focus by hackers. One main reason is small business do not believe it can happen to them because of all the big business that are out there serving a similar customer. When small businesses go electronic the main focus is not cyber security. One reason why is due to the income level of the business. Most small businesses are even taking a financial leap of faith, when going electronic connecting there business to the internet. Often times small businesses are gambling on if they have enough customers to go beyond a credit card machine let alone internet visibility, due to cost of website maintenance and website security, while keeping a store location up and running.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Snowden's Case Summary

    • 520 Words
    • 3 Pages

    Some of these changes were costly and out of the realm of possibility for small businesses. However, many of the changes all business can easily apply to their organizations. With a defense in depth approach against insider threats, businesses can apply measures to protect their data and…

    • 520 Words
    • 3 Pages
    Good Essays
  • Good Essays

    pubpolessay

    • 632 Words
    • 2 Pages

    From afar, the data breach notification system may seem wholesome, however look a bit closer and you will find many insufficiencies made up of inconsistent state data breach laws that compose our nation’s standard defense against data breaches. The inconsistencies in state data breach laws cause insufficient protection of citizens, unnecessary complexities for businesses, and de-facto national requirements. Data breaches cause corporations millions of dollars and is one of the fastest growing crimes committed. For instance, California is witnessing identity theft as one of the fastest growing crimes committed. In 2000, the Los Angeles County Sheriff’s Department reported 1,932 identity theft cases, which was a 108 percent increase from the previous year. After a large amount of customer databases containing personal information were breached, security data breach notification laws were enacted by most American states since 2002. Specifically, the first security breach notification law introduced by California State Senator Peace on February 12, 2002 was law Senate Bill No. 1386 (“SB 1386”) in the state of California; it was passed unanimously by the California Senate and Assembly and it became effective July 1, 2003. Since most states follow California’s security breach laws and California is leading the nations effort in security data breach laws, I will be discussing California’s data laws in further detail, as this will focus in on issues regarding data laws in general. SB 1386 requires any company that stores its customer’s unencrypted date electronically to notify the customers if a security breach has taken place or if they have reason to believe that unencrypted date has been stolen. As defined by California’s law, personal information “includes any user name or email address, in combination with a password or security question and answer that would permit access to an online account [as well as medical…

    • 632 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This section is going to talk about Security and how it’s going to be involved with the overall process and what impacts it will have on the system, the cloud, and anything else the company decides to use for that matter because security will always be a big impact and should always be the first thought when trying something new or doing anything online. I will also go into detail about preventative measures, and some devices that will be helpful when setting up a secure system.…

    • 1446 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Term Paper

    • 3364 Words
    • 14 Pages

    Breakthroughs in data storage, streaming, and ease of information access have become the driving force that enables data to be transferred across the globe within seconds with a simple button click. The ease of access for media has allowed companies to sell their products all over the globe and open up their businesses to consumers that may not have been reached through the typical brick and mortar store. With advancements in technology also comes the advancement of data theft.…

    • 3364 Words
    • 14 Pages
    Best Essays
  • Good Essays

    In today 's world in Cloud Computing, data can be easily accessed from any unknown source with Internet capabilities. Due to the limitless control this may present, the user may find that their privacy has been unknowingly invaded. Hidden from the users, most applications in today 's cloud computing are made up of either "Software as a service" (SaaS) or proprietary software. Both of these types of software collect information, inputted by the user, and record it for marketing use. In addition, this information can be stored away for others to access, leaving the account in the hands of someone unknown. In efforts to reaching a solution, Richard M. Stallman, a fighter for digital property rights, goes on to tell users that in order to make your data private, "users should refrain from employing SaaS applications and utilize freeware programs". (Stallman, 2013).…

    • 924 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fact of life: There are potential dangers in every area of life and business. There are those that are manmade including everything from credit card fraud to identity theft, and from deception in advertising to poor customer service. Then there are those that we refer to as natural disasters like flooding, earthquakes, and hurricanes. Let’s face it, sometimes bad things just happen.…

    • 1082 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime Law

    • 1863 Words
    • 8 Pages

    As economics and business students, you are already aware that cybercrime works to prejudice ecommerce. Companies with online operations are subject to credit card fraud, identity theft, phishing, and intellectual property crimes. Cybercriminals continue to negatively impact ecommerce.…

    • 1863 Words
    • 8 Pages
    Powerful Essays