Encap Security incorporates convenience of Apple... » Oslo & Palo Alto: Encap Security, the first in-app authentication solution to arm banks, retailers a... HGI announces new direction at BWF 2014 as it lo... » HGI has announced at Broadband World Forum 2014 that it will be taking a new direction as it moves t... Skyguard chosen to protect lone workers » VINCI Facilities, part of VINCI, has adopted Skyguard’s personal safety service to mitigate potentia... Alert Logic launches European Security Operations ... » Recent cases have highlighted that the landscape for cyber threats has increased dramatically over t... Travelex selects A10 Networks for major network an... » UK: A10 Networks has announced that Travelex Group, the world’s leading foreign exchange (FX) specia... Lieberman Software Privilege Management Platform... » London, UK: Lieberman Software Corporation has announced that its adaptive privilege management plat... Driving forward with Tokenization and HCE...new pa... » Driving forward with Tokenization and HCE – New Paper from the Smart Payment Association. In this pa... Research Group discovers vulnerabilities in the Ad... » Check Point has announced that its Security Research Group has discovered vulnerabilities in the Adm... Intamac chosen to develop innovative Cloud Video R... » Vigilance can report that Intamac has been selected by Swann Communications to develop an innovative... Cardinal Group basks in the glory of many accolade... » The Cardinal Group Retail Fraud Awards 2014 Vigilance can report that the Cardinal Group, celebrate...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

“The takeout for me is that this saga highlights the critical need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used across your company” -- Dave Anderson, Voltage Security

 

Commenting on the Internal Revenue Service’s accidental exposure of thousands of Social Security numbers on the Internet – which were spotted by a California-based archivist – Voltage Security says this highlights the need for encryption and tokenisation of any sensitive data to protect any organisation against the negative impact of data exposure.

The problem with modern IT systems, says Dave Anderson, a senior director with the data-centric security specialist, is that data can be replicated, shared and moved across multiple systems – quite literally - at the touch of a button. This requires data to be protected across its entire lifecycle, not only when it is stored away.

And with cross-platform systems and topologies making it difficult to know whether an IT resource is local, remote or cloud/outsourced, controlling data held in the clear has become an almost impossible task, he adds.

“This breach further highlights the issues around effective data security, and re-iterates the need to implement robust encryption, tokenisation and data masking controls on the data itself in order to provide comprehensive protection. This is the only way to protect sensitive information as it moves throughout an extended enterprise,” he said.

“The takeout for me, however, is that this saga highlights the need to obfuscate or de-identify the sensitive information in your organisation, wherever it is stored and however it is used and moved. The problem with multi-dimensional data – especially spreadsheet or SQL database files – is that it is very difficult to understand which elements contain private data. For this reason, encryption and tokenisation of all data becomes a driving imperative,” he added.