Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Cashing In on Data Protection

    Written by

    Debra Donston
    Published January 18, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When I was a kid, my family did two things on Saturdays without fail: We cleaned the house to strains of marching music (my father was career Army), and we went to the bank.

      At the bank, my parents deposited their paychecks, keeping just enough cash to make it through the week. When that money ran out, they didnt buy anything else. Simple.

      As for bills, my parents used a folder system. No, not the kind of folders in Windows—the only computers I knew about then were the ones that wore tennis shoes. They used a paper two-pocket folder: As bills came in, they went in the left-side pocket of the folder. As the bills were paid—every week, with a check for each—the stub went into the right-side pocket of the folder.

      Every month, my parents would sit at the kitchen table and balance the checkbook using the paper statement generated and mailed by the bank—an agonizing process for my logically minded father, who wasnt satisfied until he got the statement and the checkbook to within a dollar difference. (I learned at a pretty young age not to interrupt this process.)

      My father also eschewed credit cards, saying, “If you cant pay for it in cash, you cant afford it.” Simple.

      My father never saw debit cards become an acceptable form of payment at every place from Tiffanys to Taco Bell, but my mom continues to go to the bank every Saturday. Shes never had a debit card, and probably never will.

      How quaint, Ive often thought in recent years.

      Today, I rarely use cash, instead whipping out my debit card for even the smallest of purchases. I pay many bills online, and I “balance” the family checkbook by making sure the amount that shows up when I check my accounts online is reasonably close to what it says in my checkbook. As for credit cards, well, lets not go there.

      Have you seen that commercial where the guy who uses cash, as opposed to a debit card, brings a well-oiled retail operation to a screeching halt? In response to that ad, my 10-year-old daughter said, “Does it really take that long to use money?”

      The fact that she has to ask that question speaks volumes about todays cash flow—or lack thereof. Indeed, when she and my other daughter were younger, I made it a point to use actual money to make purchases (a.) so they would know what money looked like and what each bill and coin was worth and (b.) so they wouldnt think that this magic plastic card allowed us to get whatever we wanted, whenever we wanted, with no repercussions. (It was harder for me than it was for my parents to say that money didnt grow on trees because, for all my kids knew, it did!)

      Its not just me—Ive heard teachers say that its getting harder and harder to teach kids to do things like add and subtract money because the kids just dont have extended exposure to it.

      Next Page: Why the TJX security breach is different.

      Why the TJX Security


      Breach Is Different”>

      The old(er) I get, the more I think my parents were right about most of the things they did. And, with the recent announcement that TJX computer systems had been robbed of untold amounts of private customer information, I know they were right about dealing with cash.

      TJX, which operates the T.J. Maxx and Marshalls chains, among other stores, revealed that the computer systems that process credit, debit and return transactions had been breached and customer data stolen.

      Were hearing about it now, but the actual hack occurred in December. As I understand it, anyone who has shopped at any of TJXs stores in the last four years is at risk (a number of people that TJX officials have been quoted as saying is “substantially less than millions”—how comforting).

      The TJX incident is different from many others weve heard about in the last couple years in that data was maliciously and pointedly stolen, rather than inadvertently lost or happened upon.

      /zimages/1/28571.gifClick here to read more about TJXs corporate data theft.

      In the case of the Veterans Administration, for example, a VA employees laptop was stolen. The private information of millions of U.S. veterans was stored on the laptop, but the thief apparently didnt know that and wasnt after the info in the first place. (And, he or she probably couldnt believe that someone would be so stupid as to store that kind and amount of data on a device that could walk off the VA premises.)

      But the TJX incident is just like all the others in that the victims of the crime—potentially you, me and anyone who has shopped at T.J. Maxx or Chez Marshalls, as we call it in these parts—have to clean up any mess that results because of it.

      Oh, there are plenty of how-tos and best practices out there that will tell you how to protect yourself from a data theft and/or how to fix things after such a theft occurs. But the onus is always on the victim. YOU need to check your credit report for any untoward activity; YOU need to check your bank accounts to make sure it was really you who debited that $2 for a Dunkin Donuts coffee; YOU need to be on guard for any institution asking for more personal data than is absolutely necessary for the transaction at hand; and so on and so on.

      All of this takes time and know-how. And its getting really frustrating to have to run through this process every time a new breach is reported.

      How about if the institutions that are more than happy to take our money also take care—real care—of our personal data? How about banks and credit card companies keeping watch so that their customers dont have to (or dont have to so closely)? How about the legal system giving victims of identity theft ongoing support as they work to clean up their good names? How about the government passing effective legislation that will hold institutions criminally liable for not protecting the personally identifying information in their care?

      For now, it seems that the only way to really protect yourself is to adopt a cash-only mentality. Kids, meet the twenty-dollar bill.

      Deb Donston can be reached at [email protected].

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Ryan Naraines eWEEK Security Watch blog.

      Debra Donston
      Debra Donston

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.