The world is slowly, but increasingly, taking cognizance of looking deeper within when it comes to protecting data. CNBC TV18 recently published an article by Utkarsh Morarka on the ‘why’ and ‘how’ of data security. This is SECUDE’s take on the article.
Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.
British Airways, Apple Inc., Tesla… the list just keeps growing. The latest in this infamous line is none other than Google. Recently, former Google engineer Anthony Levandowski was accused of stealing self-driving car project details as he moved on to join Uber
In the world of manufacturing and high-tech companies the most critical IP, like details of either mature products or yet-to-be patented prototypes, is represented as constructional drawings typically stored as CAD files. Cyber-committed CEOs understand that business continuity in digital processes requires new data-centric security strategies. Here are three important points for you to keep in mind when protecting your CAD files.
They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.
Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.
To be forewarned is to be forearmed. This popular truism cannot be truer when it comes to data-centric security. However, the key question often is: where does one begin? This brief blog presents a clear step forward towards data-centric protection.
It is all about protecting your crown jewels. If you are an SAP user, you will be well aware of the security provided ‘inside’. But the key question is: what happens to the security of your data once they are downloaded or even shared with ‘legitimate’ outsiders? Can you ensure data integrity?
The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?