According to experts, a major enterprise vulnerability to cyber attacks exists as a result of poorly managed and logged data.
Businesses are constantly collecting data in a variety of forms, and in widely distributed locations, some of which can get lost or forgotten about. Healthcare Finance News reported that hackers commonly exploit this sometimes unstructured “vampire data” to drain the remainder of an enterprise’s resources. Often, this is possible because the business has not been diligent about erasing emails or other sources of information when it is no longer necessary. This data, which is typically stored in the cloud, can then be extracted without the business ever being aware of its existence. Kroll Advisory Solutions told the news source that this is why it is crucial to take regular and frequent inventory of data, which includes a system for classifying sets of information and aggregating it based on sensitivity level.
Constricting database access
Further, in order to prevent data from being wrongly reproduced or spread, enterprises should use database administration services to vigorously enforce access regulations and ensure that employees are only able to obtain information relevant to their specific job function. Tim Ryan, managing director for Kroll, elaborated on the necessary reassessment of security considerations for this year.
“2013 will require a review of information security governance, identification of information risk and controls, and preparation for the inevitable: a breach of sensitive data, a looming threat for every organization,” he said.
CloudTech supported these claims, explaining that it is just as essential to log attempted attacks in addition to data activity because businesses are defenseless to breaches that aren’t aggressively tracked and recorded. Becausethe cloud can complicate logging by running virtually and beyond the core infrastructure, CloudTech recommended employing remote database services with software capable of monitoring all server activity. This is not only critical to tracking who is active on the database, but also any relevant applications or devices that are used for server access,which is necessary for audits and compliance.
The consequences of poor logging behavior is especially detrimental because,according to Kroll, businesses may resort to unsupported assumptions about security threats instead of relying on tangible proof from log investigations.
As enterprises re-assess security strategies this year, data logging should be a key consideration to prevent the compromising of critical information. Evidence from these reports empowers businesses to identify risk factors before threats become a reality.