Minute Read: 2 minutes

Compromised data is compromised security

Can vital data be secured against theft and misuse?

In the world of national security, every infrastructure, such as airports, sea ports, railway stations, power installations and centers of administration, plays a vital role. The compromise in security of any one could lead to major impact on the economy and political stability of the country – even region. But what does all this have to do with data? Everything.

Today’s world is deeply interconnected. The Internet of Things has come to be. Data powers industries, governments and, indeed, every human institution. And when such data is misused, the repercussions is left to one’s imagination.

The case of the ‘lost’ USB stick

On October 30, Mathew J. Schwartz of InfoRisk Today (a part of the Information Security Media Group) (1) reported in his article the finding of an ordinary memory stick that contained extraordinary security details of the Heathrow Airport along with the travel routine of Britain’s political leadership among others.

Among the other questions that bring to one’s mind is: Could theft of such information be avoided? The answer to this rests in three key concepts.

  • Monitor all data flow and user-based or protocol-based machine-to-machine communication based on classification and rights with the ability to notify authorities in real time.
  • Block data that must not leave the environment.
  • Protect data that must be shared with stakeholders outside the system such that it is accessible only to those for whom it is meant.

SECUDE’s HALOCORE® is a unique solution for controlling and protecting data that are exported from SAP. The solution allows enterprises to maintain a high level of control and security over sensitive documents extracted from SAP throughout their lifetime, even if these have been shared via email, downloaded to a recipient’s PC or mobile device, or taken from temporarily saved spool jobs. For more details, click here.


Mathew J. Schwartz, ‘Heathrow Airport Security Plans Found on Memory Stick’, October 30, 2017

Comments are closed.