IT Best PracticesProblem ManagementRisk ManagementSecurityTechnical Tips

Adjusting to the Environment of Rapid Data Breach

Data is one of the most significant assets to an organization and data breach is the most imminent threat.

In this article at Help Net Security, Andy Harris explains that most of the eminent data breach incidents happened due to human failure.

The Coping Mechanism

Data breach happens due to the imprudent password, unprotected files, cache passwords in the web browsers, and phishing attack. There is a coping mechanism to deal with such circumstances:

  1. Modify Password Policy: Predictable password is the root cause of data breach. Often, lack of time and patience to change the password becomes the prime reason for random selection. Instead of forcing the workforce to change the password as per their convenience, change the method of forcing them. Explain the consequences and the best possible way to guard data by using a complex password which is difficult to decode.
  2. Users Improvement: Help the employees maintain data security breach by decreasing the amount of password refresh rate. Select a secure password for them that may not relate to the user’s personal identity yet is easy to memorize with a complex combination of signs and alphabets. You may switch to a task-based system and delegate the task to reduce direct logins.
  3. SysAdmin & DevOps Improvement: Instead of humans sharing passwords, use an established Privileged Access Management (PAM) approach to make life easier for temporary or contractual employees. Good PAM systems will map one identity instance through to shared accounts.
  4. System Improvement: Applications that are complex to install, particularly those without date needs, could be moved to a Management Application Proxy (MAP) server. This would map just the windows back to the endpoints rather than the entire application on end-points, providing less need to access systems and share passwords.

Click on the following link to read the original article: https://www.helpnetsecurity.com/2018/01/31/coping-mechanism-data-breaches/

Tags
Show More
Back to top button
Close
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.