Access "Companies Collecting Too Much Customer Data Increase Exposure"
This article is part of the April 2008 issue of Security Readers' Choice Awards 2008
If the risk of losing customer or partner information outweighs its value, why collect it in the first place? So I take my son to a local video game stop--you know, one of those that sells used games at a discount. How can you turn down a used version of Zelda: Oracle of Ages for the Game Boy Advance for a pittance of $4.99--cash? Turns out, of course, the game didn't work well--someone resold it in for a reason, I suppose. No sweat says the cashier. Within 30 days, all returns are refunded with a receipt. So I bring it back the same day and explain the situation. No sweat. Same cashier takes my receipt and starts typing away. After about four minutes, she looks up and says: name, address, phone number. "Why?" I ask. It was a cash transaction. Her brilliant answer: "Because you're returning the game." Oh, I get it: In order to get my five bucks back, I have to trust, as a consumer, that your security house is in order and that some hacker won't inject some malicious SQL code onto your Web site, waltz into your database and steal my personal information? ... Access >>>
Premium Content for Free.
Product review: Promisec's Spectator
Endpoint security solution by Promisec
Product review: Tufin's Tufin SecureTrack 4.1
Varonis DatAdvantage product review
Varonis DatAdvantage data governance software is evaluated on its configuration and management, effectiveness, policy control and reporting.
- Product review: Promisec's Spectator
Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Netgear's Netgear FVS336G ProSafe Dual WAN Gigabit Firewall combines firewall, IPsec and SSL VPN, packaged into a small-office friendly device. Information Security magazine reviews its capabilities.
Readers' Choice Awards '08: IT Security Products of the Year
Information Security magazine's annual Readers' Choice Awards honor security software, services and products of the year in several areas: antimalware, application, email and mobile security, network access control, firewalls, remote access, firewalls, SIMs, UTM, vulnerability management, wireless, IDS/IPS, and Web gateways.
Web security gateways keep Web-based malware at bay
Web Security Gateways - A new breed of integrated technology takes Web-based malware off the menu.
- Netgear FVS336G ProSafe Dual WAN Gigabit Firewall product review
Interview: Arizona CISO David VanderNaalt
The CISO for the state of Arizona helps craft an executive order that prioritizes information security in every state agency.
Companies Collecting Too Much Customer Data Increase Exposure
If the risk of losing customer or partner information outweighs its value, why collect it in the first place?
Exploring Security Myths, Misconceptions that Lead to Breaches
Perspectives: Gotcha Moments
Disclosure Laws Fail as an Incentive to Secure Data
Layer8: Data Leak Fatigue
- Interview: Arizona CISO David VanderNaalt
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...