Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/11/2016
08:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

7 Data Classification Tips

Make data classification a part of your total security program.
Previous
1 of 8
Next

Image Source: www.data4ecom.com

Image Source: www.data4ecom.com

Businesses spend millions of dollars on security technology such as firewalls, sandboxes and endpoint tools, but so many of the breaches have to do with poor policy enforcement and human error.

Greg Hoffer, vice president of engineering at Globalscape, adds that while his company offers secure file transfer software, companies really need to think about how data classification tools can help them find out how much PII they have in storage and set policies surrounding that data.

Todd Feinman, CEO of Identify Finder, an automated data classification company, adds that so often he and his team go into companies and the management has no idea how much data they have and how much of that data has PII or other sensitive information.

“So many IT managers tell me they simply have no idea,” Feinman says. “What I tell them is that they have to ‘know’ their data before they can try to protect it.”

Data classification tools can help companies get answers to these questions and help them set policies and train their employees so they can reduce their exposure to data leaking because of inconsistent policies and human error. In interviews with Hoffer and Feinman about data classification, Dark Reading developed seven tips for security managers to consider.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7088
PUBLISHED: 2019-05-23
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7096
PUBLISHED: 2019-05-23
Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7098
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7099
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
CVE-2019-7100
PUBLISHED: 2019-05-23
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.