Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Saving Your Company from a Data Breach Nightmare

By Mike Paquette
May 1, 2008
Efforts to reduce the risk of data breach must focus on reducing the likelihood of the event from occurring, according to Mike Paquette.


High profile data breaches such as the early 2007 TJX incident and the more recent case of fraud at the Société Générale have quickly raised the awareness of the problem. The data breach has now become a significant risk factor within many organizations’ risk profiles. From corporate risk officers to IT administrators, reducing the likelihood of an accidental or malicious breach of customer or company data have quickly moved up the list of priorities. While increased awareness of the risk is a positive step, actually reducing the risk is proving to be a significant organizational and technological challenge.

In many risk analyses, risk factors are measured by the product of the likelihood of an event happening and the impact of that event’s occurrence. Although a data breach is no longer an automatic death sentence for a corporation, it’s generally accepted that the remediation costs, fines and negative publicity of a disclosed data breach constitute a major negative impact to the mission of the organization. Efforts to reduce this risk must therefore focus on reducing the likelihood of a data breach from occurring at all.

The seemingly logical approach of “locking down” access to confidential data flies in the face of today’s Web 2.0 trends, where our dependency on the Internet and IT in general continues to increase. How can organizations reduce the risk of a data breach while enabling the commerce, collaboration and interactions that actually drive their mission?

It turns out that there is no simple formula that yields significantly reduced risk of a data breach. Instead, as with many risk factors, it takes the application of education, policies and technology to reduce this risk.

It is important to realize that the threat of a data breach comes from so-called cyber-criminals as well as from trusted employees and third parties. In a May 2007 study, the Ponemon Institute found that while vast majority of data breaches occurred due to missing devices, IT mishaps or negligence, a significant 12 percent of reported data breaches were attributed to criminal activity or malicious employees.

Give or Take?

One way to view the risk of a data breach considers the “give” and “take” causes of data breaches. The “give” category comprises data leakage incidents caused by the accidental or negligent actions of a person trusted with access to the data. Disclosure of confidential company news, R&D plans, trade secrets, intellectual property and employee information all fall into this category. These incidents occur when individuals leave documents in a public place, mistype an e-mail address or forget a laptop on an airplane.

The “take” category includes incidents where data, or the media on which the data is stored, is stolen or otherwise misappropriated. This category includes laptop theft, phishing and a wide variety of malware initiated incidents where information is stolen from computers as a result of becoming infected with malware.

A Give and Take Plan for Data Protection

Organizations should consider both the give and take when creating a data breach risk reduction plan. On the surface, the solution is quite simple – make it harder for trusted people to “give” away data and make it harder for those with malicious intentions to “take” it. Oh, and try to achieve these goals without negatively impacting the mission goals of the organization.

User education, creating and enforcing physical security, data protection policies, and effective deployment of technology can all play a part in reducing the likelihood of data breaches, but there are different applications of these three elements required to protect against the give and the take.

Protecting Against the Give Data Breach

Stated in its simplest form, don’t let trusted individuals give away data, or at least make the data unusable when they do!    Educate organizational members on how to label and treat confidential information. Inform users that external e-mail should not be assumed to be private, and must not contain sensitive company or customer information.

Create policies that restrict the location and mandate the control of physical media that contains the information. For example, reduce the risk of laptop theft with a policy that provides every laptop user with physical security devices for home, office, car and hotel. Make it a policy that the laptop is not to be left unsecured anywhere.

Use technology such as hard-disk encryption to ensure that even if/when computers or media are lost, the data is likely to remain uncompromised. Also, consider the use of data leakage detection tools that monitor information that is sent out of the organizations network, looking for sensitive or confidential information.

Protecting Against the Take Data Breach

Again in its simplest form, don’t let malicious employees or cyber criminals steal data from your organization.

Educate organizational members on how to defeat social engineering attempts. Re-educate IT users not to execute files attached to received e-mails, and make it clear to users “Don’t Click That Link!” Tempt-to-click e-mails and instant messages are likely to remain a primary method for infecting computers with malware, which can lead to stolen company and personal information.

Create policies that govern use of laptop computers in public Wi-Fi zones, perhaps by mandating VPN usage for all Internet access from these environments. Ensure that all users with smart-phone access to the organization’s e-mail system are using passwords on the mobile device. Enforce a policy regarding use of public computers to access company e-mail.

Use technology to reduce the risk of compromised computers that can lead to a data breach. Deploy endpoint security software, manage desktops, keep software (not just operating systems) patched. Install Network Intrusion Prevention System (IPS) technology, which is very effective in reducing the likelihood of protected computers being compromised. Consider some type of Network Admission Control (NAC) to keep compromised computers off the organizational network. Network IPS, NAC and data leakage solutions complement each other to create comprehensive information protection architecture.

The rapid growth of the data breach highlights a current imbalance in the equation that plays off user convenience against data protection. It’s time for a little give and take to restore balance to our IT-dependent world.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Paquette is chief strategy officer at Top Layer. He has more than 22 years of computer networking and security experience.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • From Threat Detection to Information Protection

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!