Gartner names proofpoint a leader in 2014 Magic ... » London, UK: Proofpoint, Inc. has been positioned by Gartner, Inc. in the leaders quadrant of the 201... Tenable's Nessus v6 Eliminates cybersecurity blind... » COLUMBIA, Md./LONDON, UK: Tenable Network Security, Inc. has announced the release of Nessus® v6, re... New German heavy tanks bring serious firepower i... » Wargaming announced today the launch of the latest content update for its free-to-play console multi... Babcock to run Defence Support Group » The Ministry of Defence (MOD) has today announced the preferred bidder for the Defence Support Group... Free white paper explains how network access can... » London: According to the International Telecommunication Union (ITU), there are now as many mobile p... Kroll Ontrack published list of worst data disaste... » EPSOM: Kroll Ontrack announced its 12th annual list of the top 10 data disasters from 2014. For the ... UPnP Forum invites organizations to use UPnP+ Cert... » UPnP Forum has launched its UPnP+ Certification level for improved device and open source implementa... CNL Software to present PSIM at Teleste Video Su... » CNL Software will be participating in the Teleste Video Surveillance Summit in Dubai on December 7, ... ExtraHop integrates with FireEye to defend against... » LAS VEGAS, NV: ExtraHop has announced an integration of the ExtraHop wire data analytics platform wi... New technology helps financial institutions mana... » Pole Star launches PurpleTRAC risk management and sanctions compliance technology enabling global fi...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security

 

Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.