Home » Cloud Security » The Importance Of Securing Your Data

The Importance Of Securing Your Data


All business owners run the risk of experiencing a security breach – not just the LinkedIn of this world (the site was stolen 6.5 million user passwords in June 2012).

“With companies putting more and more information on the web, critical data is being exposed, putting them and their customers at risk,” says Trac Bo, MNP Calgary’s Chief Technology Officer.

The costs of a security breach can be astronomical and can be compounded by unfavorable media coverage, prosecution risks and loss of customer or public trust.

Businesses must pay to fix the problem, get back to normal and prevent such incidents from happening again. There is also a cost to regain the trust of customers and to rebuild their reputation.

In the worst cases, the damage is so vast that some have to close. For example, the average cost per file (credit card, payment data or personal information) is over $ 200 and the average cost of a data breach in a large company is more than $ 5 million. dollars, according to the Ponemon Institute.

In addition, 90% of popular web applications, even if they use encryption, are vulnerable to attack, warns SSL Pulse, a website that monitors the effectiveness of secure sites. Sites for customers, suppliers, and partners, the intranet are examples of web applications. Moreover, software such as Excel, Word, Access Databases, and SharePoint can be compromised through malicious programs or JavaScript.

Incidents surrounding information technology (IT) security arises from a number of factors. Security has come to the fore in the last five years alone, so IT vendors have not allocated adequate resources and developers have not received training to date. Companies are under-investing in security personnel, which results in a lack of tools, policies, and processes to secure their data.

In addition, online applications such as cloud computing, banking transactions, e-commerce and the use of social networks, as well as mobile use on a smartphone or tablet, present new risks. The development of the security industry and best practices are struggling to keep up with new trends.

Hackers are therefore in front of a sea of possibilities.

Most businesses today rely on the Internet and some migrate their data to the “cloud” – that is, third-party companies offer to host their data on servers, databases, and external applications. but accessible via the Internet. Which does not necessarily protect more?

Information may also be unintentionally disclosed to competitors, for example, through social media. Last year, a Google employee lost his job after posting information about a change to the search engine’s pay structure.

Tags:

News In Category

/