Three Steps to Better Data Security

While data breaches are nothing new in the world of cyber attacks, they have become more and more common. Now, it is not just a question of if, but when will these attacks occur. And furthermore, what will be the impact of such a breach when it occurs? So, no longer is it a question of should you prepare, but one of how should you prepare.

One of the newest options is data breach insurance. And while this will not prevent a breach itself, it does provide coverage in such areas as legal defense against possible damages caused by such a breach, a forensic investigation to determine who was responsible and how the breach was accomplished, the notification of anyone affected by the breach, crisis management responses, and liability claims.

Insurance could help defray the cost of such an intrusion, but the best response to an imminent cyber attack and subsequent data breach is prevention. Below are three steps that you can take to protect your company against data breaches, according to a report by www.forbes.com.

1. Using the Correct Security Technology

Using the correct security measures for your needs is just as important as using security to protect your company’s data to begin with. Your company should use technology that controls the flow of information across your network, as well as controlling access to that information. You should also have systems in place that protect your end systems, encrypts any information that might be vulnerable, and be able to meet any advanced security requirements.

2. Continuous Configuration Management

While challenging, ensuring that your ongoing network configuration is handled properly is an important step toward improved network security. Regulations are being enacted that require a company to be able to assess the effectiveness of the configuration of their network’s perimeter data security, the gateways into those networks, and the security at the endpoints on a continuous nature. To this end, it is important to have these configurations in place so that effective analysis of your company’s network configuration can be achieved.

3. Address Your Companies Top Vulnerabilities

While vulnerability scanners have become an important tool in a company’s arsenal of protective measures, most do not take into context the world around them. This often results in information overload and false positives. The important thing is to adopt a comprehensive approach, taking into account a much more relevant security and network analysis. This should enable you to look at incidents and the risk they involve in context.

For more information about the Forbes report on protecting your company against data breaches, visit: http://www.forbes.com/sites/ciocentral/2012/01/02/3-steps-to-protecting-your-company-against-data-breaches/