data security

Data Security Management in Distributed Computer Systems




data security

COPS Invests in NetApp SAN Technology to Enhance Data Security & Performance

To leverage its geo-diverse redundancy, COPS Monitoring will deploy two identical NetApp SANs in its New Jersey and Texas facilities.




data security

MP govt to hire pvt agencies for cloud services for data security

Urban Development Minister Kailash Vijayvargiya said the decision has been taken to ensure smooth cloud services in each department of the state and to ensure the safety of the government's data.




data security

MorganHill Announces Launch of Comprehensive ISO 27001 Policy Templates to Enhance Data Security

MorganHill's commitment to advancing information security is reflected in the high standards and meticulous attention to detail embodied in these new templates.




data security

Data Security for Banks and Financial Institutions: Top 4 Myths About Moving to the Cloud

Many small-to-midsize banks and financial institutions are still running on-premise Microsoft Exchange email servers, whether in their own walls, or in the walls of their technology service provider. Microsoft recently announced that multiple hacking groups were targeting Microsoft Exchange servers in coordinated attacks, which could cause a damaging data breach for these organizations. With all...

The post Data Security for Banks and Financial Institutions: Top 4 Myths About Moving to the Cloud appeared first on Anders CPA.




data security

Data Security, Actual AI and Law’s Acceptance of Tech Spell the New Forefront of Law

Zev Eigen considers artificial intelligence and predictive coding to be tools in making better informed hiring decisions. 

Corporate Counsel

View Article




data security

[ Y.4810 (11/21) ] - Requirements of data security for the heterogeneous Internet of things devices

Requirements of data security for the heterogeneous Internet of things devices




data security

[ X.1603 (03/18) ] - Data security requirements for the monitoring service of cloud computing

Data security requirements for the monitoring service of cloud computing




data security

Data security in the federal government

Gil Vega,  chief information security officer for Veeam, joins host John Gilroy on this week's Federal Tech Talk to explain why federal IT officials should update their data security strategies.

The post Data security in the federal government first appeared on Federal News Network.




data security

Revolutionising data security: IBM introduces Guardium Data Security Centre with GenAI capabilities

The centre incorporates GenAI features for generating risk summaries and improving productivity among security teams.




data security

How a Remote Work Policy Could Actually Strengthen Data Security | WIRED Brand Lab

BRANDED CONTENT | Produced by WIRED Brand Lab with Comcast Business | It’s proven that workplace flexibility boosts morale, productivity and retention but there may be a surprising added benefit to a remote work policy shift: improved cybersecurity.




data security

Data Security vs. Privacy: Can You Have Both? | WIRED Brand Lab

BRANDED CONTENT | Produced by WIRED Brand Lab with ExtraHop | Data is the most valuable enterprise asset. Encryption keeps it secure but can hide malicious traffic from security teams. With personal data and corporate reputations at stake, security experts Jesse Rothstein (ExtraHop) and Mikko Hyppönen (F-Secure) spoke with WIRED's Digital Director Brian Barrett to answer the key question: how can enterprise security and data privacy co-exist?




data security

Is Data Security Only a Myth? [Infographic]

Data protection appears to be many companies' Achilles' heel.




data security

Firms Still Struggling With Data Security Standard




data security

Canadians remain worried about data security: Digital ID survey

(The Paypers) A new survey suggests the majority of Canadians remain worried about the security of their personal information online.




data security

The Connectivity Center Offers a Uniquely Qualified Perspective Into Computer Data Security

Having been involved deeply in computer data security at every stage, the people behind The Connectivity Center bring to the world of cybersecurity products and services an unmatched perspective on this staggering issue.




data security

The Obvious Data Security Solution is Overlooked as Complexity Explodes

The Connectivity Center is devoted to the down-to-earth sector of data security solutions – the thousands of physical points of access that connect vital data network and information systems.




data security

The Connectivity Center Offers IT Cyber Safety and Data Security Solutions

The Connectivity Center offers an array of IT cyber safety and data security solutions that will defend your digital network, including USB port blockers, network port locks, fiber optic port locks, and other devices.




data security

Systems and methods for data security

A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user.




data security

Variable domain resource data security for data processing systems

The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.




data security

Enhancing data security using re-encryption

A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups algorithm; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers.




data security

DATA SECURITY POCKET AND GARMENT

A data security pocket and garment is disclosed for better positioning and protecting data and information contained in a card or device for housing such information from its theft or misappropriation when it is placed in the pocket portion of the invention. The pocket portion of the invention is specially positioned on and secured to a portion of the garment or clothing surface near or adjacent to the arm-pit area with which it is used in combination, with its own design, to provide a more protective pocket environment for placement and transportation of a card, chip or other data/information carrying or storing device or means. The pocket and the garment in combination make up four layers from which the pocket is constructed, secured and positioned. These layers include the top pocket layer (12); the top security layer (14) and the bottom security layer (16), each fabricated from security anti-RFID material; and the garment, clothing or base layer (18). These layers are connected one to the other so that the pocket portion has a first accessible opening (40) and a second accessible opening (42) when secured in proper position on the garment (18). Further provided is the trim security flap cover (22), also fabricated from security anti-RFID material, and the upper cover enclosure (20), each of which is secured above the pocket portion on the garment layer (18), and which pivot and close over the top pocket layer (12). Coupling is provided for both the upper cover enclosure (20) and the top pocket layer (12); and the trim security flap cover (22) and the top pocket layer (12). In another aspect of the invention an auxiliary security area (39) is provided on the top pocket layer (12) adjacent or near the coupling for the trim security flap (22).




data security

In re US Office of Personnel Management Data Security Breach Litigation

(United States DC Circuit) - Revived claims that the U.S. Office of Personnel Management's woefully inadequate cybersecurity practices enabled hackers to steal personal data about millions of past and present federal employees. Reversed a dismissal in relevant part, in a lawsuit brought by labor unions and others arising out of a 2014 cyberattack.




data security

In re US Office of Personnel Management Data Security Breach Litigation

(United States DC Circuit) - Revived claims that the U.S. Office of Personnel Management's woefully inadequate cybersecurity practices enabled hackers to steal personal data about millions of past and present federal employees. Reversed a dismissal in relevant part, in a lawsuit brought by labor unions and others arising out of a 2014 cyberattack.




data security

Why We Need a Transatlantic Charter for Data Security and Mobility

28 June 2017

Dr Christopher Smart
Former Associate Fellow, US and the Americas Programme
Setting common guidelines for data flows is crucial both to protect the goods and services that already depend on big data and to support the next generation of productivity gains and business opportunities.

2017-06-23-TsystemsData.jpg

Data centre for T-Systems, a subsidiary of Deutsche Telekom. Photo by: Thomas Trutschel/Photothek/Getty Images

While trade and tax remain at the heart of the difficult economic conversations between Europe and the US, a new issue has emerged as a potential source of even greater friction: data.

Growth in the traditional global trade in goods and services has levelled off, but cross-border data flows continue to expand rapidly and the challenges of developing policies that protect privacy, security and innovation are already tremendous. For example, data analytics are driving dramatic productivity gains in industry, particularly for large and complex installations whose safety and efficiency will increasingly depend on flows of those data across jurisdictions. Meanwhile, ‘fintech’ (financial technology) start-ups and large banks alike are testing new modes of accumulating, analysing and deploying customer data to provide less expensive services and manage the risk profile of their businesses.

The rules that govern the collection, transmission and storage of data are perhaps one of the more surprising controversies in the transatlantic relationship. Similar liberal democracies with similar geostrategic interests might be expected to approach the handling of personal, corporate and government data in more or less the same way. And yet the US and its key European partners have struck different balances in the trade-offs between national security and citizens’ rights, between freedom of expression and personal privacy, and between free enterprise and market regulation.

While the US debate on the use of data has often been framed around the trade-off between national security and personal privacy, Europeans often face an even more complex set of concerns that include worries that their digital and technology firms lag behind dominant US competitors. The political and regulatory uncertainty helps neither side, and leaves transatlantic companies struggling to comply with uncertain and conflicting rules in different jurisdictions.

This makes more determined efforts by US and European policymakers to agree basic principles that will guide the usage and protection of personal and commercial data all the more important. While common regulations or even greater alignment among regulators seem out of reach, a ‘Transatlantic Charter for Data Security and Mobility’ would provide a set of principles for more specific rules amid political landscapes and technological developments that are evolving rapidly. It could also provide the basis for firms, whether in manufacturing or financial services or health care, to draft their own voluntary standards on how they protect data even as they develop new algorithms that improve productivity, safety and customer satisfaction.

Embarrassing leaks, careful denials and endless lawsuits will continue to shape the awkward efforts of policymakers to find common ground around issues like cyberespionage, defence of common networks and the sharing of personal data with law enforcement. Cyberattacks with the aim of disrupting government operations or influencing election campaigns will add still further pressures. These will all serve as a noisy backdrop to a related but separate debate over how commercial firms should exploit the opportunities of global networks and ‘big data’ analytics while protecting national interests and privacy.

Yet, setting common guidelines for commercial data transmission and storage remains crucial both to protect the goods and services that already depend on sophisticated data-gathering and analysis, and to support the next generation of productivity gains and business opportunities.

Global firms yearn for clarity and predictability as they organize themselves to make the most of the data revolution. Neither is likely to become a reality soon. The EU’s new General Data Protection Regulation will take effect in 2018, but its implementation will inevitably be coloured by the fact that American firms currently dominate the information technology business. Last year’s ‘Privacy Shield’ agreement between the US and the EU renews the permission for firms with transatlantic business interests to transfer data, subject to compliance with basic standards of protection, but the agreement remains vulnerable to European court challenges. Britain’s decision to leave the EU adds a further complication, as it establishes its own set of data protection rules that may not easily align with either European or US requirements. Meanwhile, the World Trade Organization continues to debate new rules for digital trade, even as markets like China, Russia and Brazil make up their own.

If this ‘Transatlantic Charter for Data Security and Mobility’ were adopted bilaterally, say as part of the annual reviews of the US–EU Privacy Shield agreement, it could form the basis for broader cooperation on these issues, helping to drive progress in the G7 and G20 and ultimately perhaps in trade agreements under the WTO. It would hardly secure complete alignment on these questions, but it could help establish the framework for a debate that all too often lurches to extremes and risks damaging a fundamental alliance for global stability – along with a fundamental driver of 21st-century economic progress.

To comment on this article, please contact Chatham House Feedback




data security

Big data, big responsibilities : a guide to privacy & data security for Australian business / Nick Abrahams and Jim Lennon.

Data protection -- Law and legislation -- Australia.




data security

Data Security and Privacy

Many state and local education agency websites aren't disclosing the presence of third-party tracking services, which can use information about users' browsing.




data security

Insurance Data Security Act Signed into Law

On Wednesday, July 31, 2019, Governor John C. Carney, Jr., signed House Bill 174 (“HB 174”) into law. Titled the Delaware Insurance Data Security Act, this law is based on an NAIC Model Act, which establishes a comprehensive regulatory framework requiring insurers licensed to do business in Delaware to implement information security programs, report instances […]




data security

5 Data Security Risks for Nonprofits (and How to Fix Them)

 

Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach?

This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information.

#1 Risk: Malware and Software Vulnerabilities

The Problem

This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data.

How You Can Mitigate It

To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed.

Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution.

#2 Risk: Ransomware

The Problem

Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data.

How You Can Mitigate It

Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted.

In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.)

#3 Risk: Public Wi-Fi

The Problem

Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes.

How You Can Mitigate It

First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure.

If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more.

#4 Risk: Inappropriate Sharing of Sensitive Information

The Problem

Sharing sensitive information via email, messaging apps, or similar means is a risky proposition.

Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.)

And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person.

How You Can Mitigate It

Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office.

If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts.

In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed.

To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication.

#5 Risk: Handling Credit Card Data

The Problem

A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names.

How You Can Mitigate It

Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches.

Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments!




data security

Product safety and IoT: European Commission orders recall over data security failings

The market for wearable tech is huge and growing, driven by new wellness applications and improved connectivity. Add to that the increasing number of new IoT devices and applications in the home, workplace and industry, and the opportunities both fo...




data security

Aarogya Setu App is Safe and Secure in Terms of Data Security: Ravi Shankar Prasad

It is now mandatory for all government and private sector employees attending office to download the app, according to a Union Home Ministry directive.




data security

Rahul Gandhi Speaks 'New Lie' Daily, Aarogya Has Robust Data Security Architecture: BJP

Senior party leader Ravi Shankar Prasad rejected Gandhi's charge that the app has been outsourced to a private operator and asserted that it has a robust data security architecture.




data security

Work from home: Ensuring data security a challenging task for businesses

Both employers, employees are liable for data breach from home




data security

Privacy and Data Security Law Deskbook

An essential compliance tool for every privacy officer and attorney involved in managing privacy and data security issues, Privacy and Data Security Law Deskbook provides the thorough, practical, sector-specific guidance that helps you meet today's challenges and minimize the risk of data breaches that can damage a company's reputation.

It enables you to comply with data privacy laws relating to:

  • Marketing efforts – including standards governing online behavioral advertising and targeted marketing
  • Privacy in the workplace – such as standards governing employee monitoring and background screening of employees and applicant
  • Health information – focusing on the Health Insurance Portability and Accountability Act (HIPAA), with insight into the HITECH Act's impact on data breaches and other recent changes
  • Financial privacy – including the Gramm-Leach-Bliley Act's regulations for the collection and disclosure of personal information in the banking and insurance industries
  • Consumer reports – with detailed coverage of the Fair Credit Reporting Act and Fair and Accurate Credit Transactions Act
  • Government surveillance – including the latest developments in warrantless wiretapping
  • Social networking – including the FTC's current approach

Packed with sample documents, checklists, and other compliance-enabling tools, this resource allows you to:

  • Navigate the various breach notification requirements in the more than 45 states that have such laws in place
  • Comply with global data protection laws (including those in the EU), facilitating compliance with cross-border data transfer restrictions
  • Keep current with emerging legal trends, from changes in federal and state laws to the latest data privacy regulations abroad

If you would like more details about this product, or would like to order a copy online, please click here.