With data increasingly recognized as a highly valuable enterprise asset, data protection is understandably becoming a higher priority.
To explore the issues surrounding data protection, including the role of people, processes, and technology in creating a proactive security stance, Database Trends and Applications is introducing the Cybersecurity Sourcebook.
The relentless stream of data breaches has elevated security as a concern. It’s not just cybercriminals with nefarious intent that pose a threat or even privileged users seeking to take advantage of their authority. Data breaches can happen in endless innocent ways—a conscientious employee sending assignments offsite to work on at home, a lost laptop or flash drive, or a click on a wrong file during a momentary lapse in judgment.
As a result, today, data security can no longer be considered strictly an IT responsibility. Today, data security is everyone’s job.
To download the Cybersecurity Sourcebook, go here.
And, as organizations collect more sensitive data than ever before that is stored in a greater variety of repositories—including NoSQL and big data platforms, on premise and in the cloud, and governed by regulations such as HIPAA Hitech, PCI, and the new EU GDPR—the stakes surrounding data management continue to rise. Financial penalties exist, but those may pale, experts say, compared to the potential loss of reputation and business opportunities.
Perimeter security is important but that alone is not enough to ensure data protection. Instead, what is increasingly required is a holistic approach involving user education, and an array of solutions such as encryption, monitoring and auditing, automation, and identity management.
The Cybersecurity Sourcebook special report contains articles penned by subject matter experts on the full range of data security issues facing enterprise data professionals and the approaches that can help. Plan now for preventing and handling a breach, these experts advise. The question is not “if” it will occur, but “when.”