Risk
8/31/2009
11:23 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Data Breach Silence Breached: 5 Good Security Tips

For every high profile big headline data breach, there are plenty of others that are kept quiet. A good piece in Informationweek takes a peek behind the curtain of quiet and offers some solid lessons in how to avoid having your data compromised.

For every high profile big headline data breach, there are plenty of others that are kept quiet. A good piece in Informationweek takes a peek behind the curtain of quiet and offers some solid lessons in how to avoid having your data compromised.The article, "5 Security Lessons From Real-World Data Breaches" offers solid insights into five key security areas (and issues) that call for constant attention:

1. Integrated security, with special attention paid to Web apps

2. Secondary controls including internal firewalls and monitoring

3. Understand the limits of security technology -- and the speed with which the crooks stay ahead of security tech

4. Keep an eye on third-party apps and services and their security practices and procedures

5. Be prepared to respond to breaches and incidents

I'm particularly taken with the straightforward and accurate emphasis placed on the fact that security technology alone isn't a guarantee of security, as well as the attention-- not given often enough -- to third-party security. As more and more small and midsized businesses turn either of budget necessity or technical need to outside providers, it becomes more and more critical that a thorough review of the outside company's security policies and history are fundamental to the evaluation process and, furthermore, should be reviewed on a regular basis thereafter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8617
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in the Web Action Quarantine Release feature in the WebGUI in Fortinet FortiMail before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5, and 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via the release parameter to module/re...

CVE-2015-0891
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Simple Board allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-0892
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Image Album allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-0893
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Relay Novel allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-2209
Published: 2015-03-04
DLGuard 4.5 allows remote attackers to obtain the installation path via the c parameter to index.php.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.