Premium Content

Access "Stopping the Next Heist"

Published: 16 Oct 2012

Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems. From the ChoicePoint fiasco to the CardSystems debacle, data security breaches make news all the time. Rarely does a week go by without a report of another incident of credit card accounts exposed, personal information stolen, or backup tapes disappearing. Universities, banks, government agencies and even security software companies all have been in the unfortunate spotlight after a breach. The Privacy Rights Clearinghouse tallied nearly 100 breaches between February and December last year. Not only have storage networks created another attack point, but storage networks, networked backup and recovery systems are some of the most direct routes to your information. Why hack a server when you can go around it to get to the data? Storage systems aren't just a target-- they're a big, juicy target for a heist. A big reason for the concern and why we're hearing about all these security problems is due to laws--such as SB ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free