Security

Recovering from a Data Breach

By | Blog, Security
Nobody wants to think about the challenges of a data breach. “It won’t happen to me” or “that’s just for the big guys, I’m not a target” keeps us feeling safe, but the truth is a data breach can happen to anyone. In fact, it is estimated that half of cyberattacks are targeted at small businesses. This doesn’t mean it’s time to panic, just be prepared. Here is a quick overview of what to do if your company experiences a data breach. Before the Breach – It’s a great idea to start thinking about your strategy now so that you can mobilize the most effective response in the event that your company experiences a breach. Create a plan that will involve what steps you will take and who will be your active response team. This is also a great time to research potential partners so that you have data security experts at your disposal if you should need to call them in. Responding to a breach is a multi-step process, and it will expedite your response and minimize the breach impact if your company is ready to go should the time arise. Stop the Leak – The first step is (more…)
Security

Protect Your Cloud Database with Top Strategies for Cloud Security

By | Security
Database and data security are major concerns for most organizations, with good reason. Bad actors are pervasive in our interconnected environment and staying one step ahead takes strategic planning and active management. With more and more databases hosted in the cloud, organizations must be particularly aware of the security risks and data protection strategies available. According to the 2019 Cloud Security Report from Synopsys, 93% of organizations reported being “moderately or extremely concerned about cloud security.” This is understandable, but this concern doesn’t outweigh the benefits of utilizing a cloud or hybrid infrastructure. Instead, the important focus should be on developing and maintaining a robust security strategy, identifying top products and service providers, and taking a proactive stance in your data security platform. Selecting a Secure Cloud Provider – One of the first steps in establishing and maintaining a secure cloud database for your company is identifying the best provider for your needs. Going with a well-established service provider, like Microsoft or Oracle, means peace of mind knowing that the company has an established record of industry-leading security practices. Saving a few dollars on the front end with lesser known providers is just not worth it if it opens up (more…)

Preparing for the General Data Protection Regulation (GDPR)

By | Security
The General Data Protection Regulation (GDPR) becomes fully effective tomorrow. The time is finally upon us. If that makes you nervous, relax, we’ve got your back. I’m sure you’ve been thinking a lot about these regulations recently, doing whatever you can to prepare. So have we. Our team is very familiar with the legislation. We have been working tirelessly to ensure that all our services are in compliance. Any third parties have been thoroughly vetted, and our security experts are prepared to review your situation. Here is a quick overview of the important points of the GDPR and how our services fit in. General Data Protection Regulation The GDPR is a new set of regulations by the European Union (EU) that will come into effect on May 25th.  Personal data is spreading at an unprecedented rate today. With the GDPR, the EU plans to get in front of the information sprawl to protect personal privacy. The new legislation will unify the practices and penalties of member states. This means both businesses and individuals know what to expect regarding privacy laws no matter where they are interacting. All EU citizens will be under its protection. If you are not actively doing (more…)

SAP Sybase ASE – Keeping Private Data Private With Data Encryption

By | Database Technology Trends, Security, Sybase | One Comment

Data security is one of the hot topics when you ask top executives about what keeps them up at night. Keeping private data private is a never-ending challenge that needs constant attention and dedication. Data encryption is your best defense for protecting sensitive data. Common access control mechanisms and limiting the power of database administrators will make it harder to access the sensitive data, but once this hurdle is overcome the data is freely accessible. Data encryption will supplement and enhance these security measures by protecting sensitive data at rest in backup files and database files that could be exploited by powerful OS users. Read More