New Cybercrime Business Model: On-Demand Personal Data
…given the shifting nature of attacks.
“An emerging best practice among many technology leaders is to adopt a data-centric security approach, which protects personal data with anonymization technology like tokenization. Not only does tokenization allow organizations to meet compliance requirements and remain secure, but tokenization also allows organizations to securely embrace modern technology like hybrid or multicloud computing, which has been scrutinized as having major data security gaps,” said Deveaux.
There are security gaps on the user end to protect as well.
“It’s past time for companies to require two-factor authentication for sensitive services; it’s clear passwords aren’t enough and opt-in approaches only work for the already security-minded,” said Gerrit Lansing, field CTO with STEALTHbits Technologies.
Security pros should also consider adding to their risk assessments, the risks from on-demand data profiling on high-ranking clients and on lower-ranking client personnel whose data can be used to infer location or other info on more high-ranking personnel.
- Page 1
- Page 2