Three Tips on How to Minimize Security Threats
Three tips on how to minimize security threats Tip No. 1: Reduce exposureTip No. 2: Harden the infrastructure and develop response capabilities Apply vendor security patches as quickly as possible. Use virtual patching if it's not possible to apply physical patches in a timely fashion, and use only strong passwords. Also, remove all default usernames and passwords. Automate breach prevention capabilities and prepare a rapid response plan in case of a breach. Isolate and mitigate incidents. Tip No. 3: Monitor access to databases in real time Check the logs and audit, audit and audit. Be proactive, not reactive, and monitor insiders and privileged users-not just the perimeter. Detect all access to sensitive data and identify malicious or suspicious activity as it happens-before it's too late. The need to preserve the confidentiality and integrity of data, and to monitor privileged user activity is driving CIOs and auditors to reconsider their strategy for database security and to impose stringent controls across database systems. It's critical they implement a workable, secure solution and then act upon it. It's also essential to maintain database security review processes and stay up-to-date with patches and controls. After all, compliance demands it and customers expect it. Dominique Levin joined LogLogic in 2004 and is responsible for overall corporate strategy. Prior to joining LogLogic, Dominique was at Crimson Investments, where she was a board member and vice president of marketing for PoliVec, a security software company. Previously, Dominique managed the voice over IP business at Dialogic (an Intel company), including the industry's first VOIP gateway. Prior to that, Dominique launched Japan's first international remote access service for Nippon Telegraph and Telephone. Dominique received an MBA from Harvard Business School and graduated with distinction. She also holds a Cum Laude M.S. degree in Industrial Engineering from the Delft University of Technology in the Netherlands. She can be reached at email@example.com.
Treat personal, identifiable information as sensitive information and put proper security measures around them. Also, rigorously apply security principles such as segregation of duties and least privileges-just enough for people to do their jobs, nothing more. Finally, consider third-party access carefully and encrypt data.