Advertisment

Stop data loss before it happens

author-image
CIOL Bureau
Updated On
New Update

NEW DELHI, INDIA: By now, some of us are probably well aware of the threats that viruses, software vulnerabilities, phishing, spyware, and spam pose to your small business. Meet the newest member of the threat landscape: data breaches. It’s important to recognize that no business is immune to the risk of data breaches.

Advertisment

A damaging phenomenon



Data breaches in business networks are on the rise, and the numbers will probably continue to rise due to the increasing focus by consumers, regulatory bodies and governments. Industry analyst Forrester Research calculates the direct costs of a database breach for non-financial companies at $15 per customer, covering customer notification and offers of credit monitoring services, IT remediation, revenue impacts from lost customers, and direct legal and audit fees.



For a financial firm that issues credit cards, Forrester adds another $35 per customer, for a total of $50. Calculating total costs per incident, IT security specialist Ponemon Institute LLC estimates that each security breach incident costs $14 million. Overall, analysts estimate 2006 impacts of database breaches in 2006 at about $1 billion.

While data breaches are very costly in financial terms, they also come at a price to the business’ reputation and customer confidence. According to a recent IT Policy Compliance Group report, business losses can be significant if the breach is reported.

Advertisment

Benchmarks show businesses experiencing a publicly reported data loss expect to see an eight percent decline in customers and revenue, an eight percent decline in the price per share for publicly traded firms, and additional expenses averaging $100 per lost customer record for firms that publicly disclose data losses and thefts.

Types of breaches There are four categories that cover ways that data can become breached:

•    Accidental Exposure: Information leaked via error

•    Dishonest Insider: Abuse of employee privileges

•    Stolen Computer: Employee reporting computer missing

•    Hacking: Gaining unauthorized access

Advertisment

Protect vital information

Database breaches differ in several ways from hacker attacks, viruses, worms, spam, phishing and other types of threats. Focused on information rather than infrastructure, attempts to compromise database defenses are often motivated by financial gain rather than attention.

Due to the lucrative possibilities, the sophistication of database attacks is rising. Professional criminals, not amateurs, are staging the attacks, and the severity of the impact is rising.

Advertisment

Just as there are new attackers, there are new patterns of attack. External hacking, accidental exposure, lost or stolen backup tapes, and lost or stolen computers are still significant sources of data leakage. But database attacks are often launched with the active participation of authorized insiders who access critical data by:

•    Hacking application servers: Gaining access through an application, circumventing infrastructure-based defenses.

•    SQL injection: Done by injecting SQL commands into otherwise innocuous fields, compromising database security from outside corporate networks.

Advertisment

•    Abusing privileges: An employee who abuses their data access privileges.

Traditional database security

There are some tried and true security solutions that help protect databases. These include:

Advertisment

•    Role-based access controls to narrow down who can access what information in the database.

•    Encryption on the network to protect against eavesdroppers, and field encryption in case the database server is physically stolen or broken into.

•    A host-based IDS to help protect against a malicious attack on the database server OS.

Advertisment

•    A network-based IDS to help protect against a malicious attack on the network.

These techniques help harden the database environment – but the database is still vulnerable to the insider attack. Who do you trust on the inside, and how do you monitor those that you trust?

Data-centric database security



Organizations now need solutions designed to help business protect its most critical data from loss, leakage, and data fraud by:

•    Providing real-time detection of leakage of sensitive company information.

•    Analyzing behavior against established policies and access history to identify anomalous behavior, even by authorized users.

•    Meeting audit requirements by logging all data flowing into or out of the database—adding no overhead—and storing the data to a secure repository.

•    Improving control of information assets.

•    Enhancing the coordination between business and IT groups.

Conclusion

Data breaches are becoming a high-profile element of the threat environment. Most data-centers are too complex and porous to protect critical information. That’s why a data-centric approach is called for—one that examines all transmission of information for critical patterns, without compromising database, application, or network performance. Companies now need solutions that reduces risk without interrupting normal operations – which can mean a huge savings for the business.

tech-news