Muhammadu Buhari: A Nepotist and Mujahid in Govern... » SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW Acts of a President with a mustard seed-mind and a ... UK lockmakers meet the lock attack challenge » UK police are continuing to warn householders about the vulnerability of domestic entrance door lock... Executive cyberstrategy sessions unite senior ex... » Medford, NJ: Watchful Software has announced the launch of its new Global Thought Leadership Program... Matrix42 launches new package manager for Microsof... » London: Matrix42 has announced the latest release of its new Package Manager solution. Administrator... Peplink helps innovative Sao Paolo School solve ... » Peplink has announced a successful project with Colégio Next, a school in Sao Paolo, Brazil that has... Certifigate Found In the Wild on Google Play » New insights on the extent, exploitation, and mitigation of this threat Three weeks ago, Check Poin... TACKLE WORLDWIDE WATER SHORTAGES WITH DIET, SAYS ... » At the start of World Water Week - the forum tackling global water challenges - The Vegan Society ha... 2015 Presidential Election Isuues » After that historical backgrounder in Part I, I shall now examine 4 election issues, the two on ever... Analysys Mason tackles file sharing securely wit... » London (UK): Varonis Systems, Inc. has confirmed how it has helped telecoms research and consultancy... ASIS and (ISC) 2® to host Career Center at ASIS... » Alexandria, Va.: Security professionals can get answers to their most pressing career questions and ...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security

 

Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.