How to Avoid the Next Data Breach

2007 may be remembered as the year of data breaches (unless 2008 surpasses it, which we hope will not be the case). Big names from Disney to Western Union, Fidelity National Information Services and of course TJX were all in the headlines for the wrong reasons. Security, it is often said, is only as strong […]

Written By: Slavik Markovich
Dec 21, 2007
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

2007 may be remembered as the year of data breaches (unless 2008 surpasses it, which we hope will not be the case). Big names from Disney to Western Union, Fidelity National Information Services and of course TJX were all in the headlines for the wrong reasons.

Security, it is often said, is only as strong as its weakest link: leave an opening and someone will find it. There is some truth to this, but if this were the whole truth then security would be an all-or-none proposition – luckily, it is not. Most breaches, especially large-scale ones, are the result of multiple failure points. A breach on the scale of TJX, which continued undetected for 17 months, did not occur because someone had forgotten to follow one rule or close one back door.

Therefore, the good news is that taking even some of the recommended measures can greatly reduce the risk of data breaches, or at least mitigate their impact if they do happen by enabling early detection and quick remediation. Here are some key elements that can help achieve this:

1. Have a viable, up-to-date security policy: Make sure your security policy takes into account what data assets need protecting, the threat landscape and the potential consequences of a breach. Have procedures in place for quick response so that if the worst happens, the organization can react rapidly and minimize damage. Too many companies have policies that address yesterday’s threats, or ones that are up to date but are hidden from the employees who should know them by heart. Communicate your policy to employees, and revise it periodically.

2. Know your sensitive data and safeguard it: Determine where your sensitive data assets are – by “sensitive”, we mean data that if stolen or exposed would cause serious damage to the business, its employees, shareholders, customers or partners. Control access to this data, preventing unauthorized copying, printing and backups. When reading about lost laptops with sensitive data (encrypted or not), one often wonders what such data was doing on a laptop in the first place – start there.

3. Apply the least privilege principle: Give users and applications the minimum required access, especially as regards sensitive data. Do not grant privileges based on future needs but current ones, and regularly review existing privileges and revoke the ones that are no longer required. In today’s enterprise, with so many consultants, outsourced developers and partners gaining access to internal systems, it is easy to disregard just how many external elements have access to systems for which they no longer need it.

4. Encrypt data in motion: Choose the right solution for your environment, using strong encryption standards and algorithms, coupled with authentication and key exchange mechanisms that make sense. There are no “one size fits all”, and a heterogeneous environment may require the use of various standards including IPSec, WPA2, SSL and SSH. TJX, for example, used weak encryption (WEP) on its point-of-sale WiFi devices, giving criminals the opening through which they began stealing credit card numbers.

5. Encrypt data at rest: When done right, this ensures that only those who need to see sensitive data see it. However, it is important to choose the right kind of encryption and do it judiciously, covering only sensitive data. Key management is crucial, because if encryption keys are distributed to too many users, applications and devices, it will render itself useless in terms of security.

6. Monitor database activity: Nowhere would you find more useful sensitive data than in enterprise databases, yet most enterprises have zero visibility into who is doing what in the database. Real-time monitoring and auditing gives you the ability to enforce usage policy and provides an additional and necessary layer of security in the place most likely to be the source of a major breach. Apply automatic prevention where appropriate (e.g., obvious SQL injection attacks). The hackers that pilfered almost 100 million credit card records from TJX could not have done so without unfettered access to the database – monitoring would have certainly caught this early on. It is not for naught that database activity monitoring is considered a premier “compensating control” in PCI DSS, being a viable alternative to encryption.

7. Regularly check and harden configuration of components: Use automated tools to find bad configurations, weak passwords and vendor defaults in databases, application servers, routers and other devices. For example, a certain system has a default privileged user account that comes with the password “change_on_install”, which of course needs to be changed after installation but sometimes is not. A surprising number of breaches are due to weak passwords – those are practically “X marks the spot” signs for potential intruders.

2008 will be marked by strides in more coherent, enterprise-wide IT security policy enforcement. Most enterprises have a large gap between their security policies on the one hand, and how they translate into processes and systems on the other hand. Additionally, regulatory compliance has been driving large-scale data governance initiatives that overlap, in part, with security concerns. First it was Sarbanes-Oxley, more recently the credit card industry’s PCI DSS, and in specific sectors there are additional compliance considerations such as HIPAA, GLBA or SAS 70. 2008, hopefully, will witness more top-down driven initiatives that relate to plugging real gaps in security based on risk.

Slavik Markovich is CTO of Sentrigo.

Recommended for you...

MinIO Debuts Academy With AI Partner Enablement

MinIO launches MinIO Academy to train IT pros and partners on AIStor, delivering expert-led courses for AI-driven object storage mastery.

Jordan Smith
Aug 18, 2025
Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
GitHub CEO Steps Down as Microsoft Tightens AI Integration

GitHub CEO Thomas Dohmke to step down in 2025 as Microsoft moves platform into CoreAI, deepening its role in the company’s AI development strategy.

Allison Francis
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.