BAE Systems awarded £50 million contract » Photo: MoD Photo: MoD The Ministry of Defence (MOD) has awarded a £50m contract to BAE Systems t... Octavian opens new office in South Africa » Octavian Security has kicked off its ambitious 2015 growth plans by launching a new South African of... icomply partners with TIS in security overhaul of ... » icomply has recently partnered with TIS on overhauling the security system of Boots UK. The central ... Tech Trailblazers Awards announce the startup wi... » London, UK: The Tech Trailblazers Awards, the first annual awards program for enterprise information... ASIS Foundation and University of Phoenix to awa... » ASIS Foundation Opens Application for 10 Full-tuition University of Phoenix Scholarships Feb. 2 Lieberman Software reduces the risks of enterprise... » LONDON, UK: It can be almost impossible to manually discover and track all of the privileged account... Cubic Defence New Zealand ranks number one for D... » SAN DIEGO, Calif.: Cubic Corporation has announced that Australian Defence Magazine ranked Cubic Def... Blame the 'Grand Children' of the North (GCON) ov... » When people are secluded and prevented from being exposed to the trends of civilisation and enlighte... AppRiver dissects current global threats to cybe... » London, UK: AppRiver, LLC has released its year-end Global Security Report, a detailed summary and a... OPSWAT acquires email security provider Red Earth ... » LONDON (UK): OPSWAT has acquired Red Earth Software, developer of email security and secure file tra...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security

 

Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.