Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

Why are companies failing at data protection?

By Alex Pezold
Data protection: your enterprise may be failing
August 18, 2021

The issue of protecting sensitive data is challenging for every organization, given how essential data has become to digital businesses, ecommerce brands, and financial institutions. Unfortunately, data theft due to breaches, leaks, exposures, and other compromises are all too common in the digital landscape, meaning organizations are failing to establish effective security postures. The ultimate cost and consequences of data breaches can be far-reaching and even permanently damage a company’s reputation.

There is a growing consensus that if a set of data does not add value to an organization or enable essential operations, it should not be stored. However, if an organization does decide to store data, there are responsible steps that can be proactively taken to ensure the data is protected. In fact, many industry best practices can help satisfy relevant regulatory compliance obligations, too. For example, leveraging additional security measures such as format-preserving encryption or tokenization meets common security requirements for data protection while keeping elements of the original data, which retains its usefulness to the business.

A harsh dose of reality is that no solution can claim to be a surefire or foolproof way to stop data breaches. The goal of this article is to impart simple security rules or wisdom, to help companies construct stronger cybersecurity strategies, and to ultimately build a solid foundation for protecting the data that is critical to digital business operations.

You cannot secure the unknown.

To determine the scale of the sensitive data in an organization, there needs to be a sufficient data discovery process. The idea is to also rigorously evaluate the risk of storing sensitive data versus its utility for analytics and other business purposes. Using tools to find and classify, or “map,” the sensitive information within the environment can streamline the process.

After it has been mapped, organizations can understand the scope of data to be secured and can begin to go about reducing associated risks. For instance, data shared with a third party or data that’s accessible to multiple employees via the network where data is stored is at greater risk for exposure. To reduce the risk of compromise or improper handling of data, teams might minimize the number of individuals or systems that are in contact with sensitive information.

You cannot skip the perimeter.

Although they cannot be the only measures used for protecting sensitive data, all traditional methods of perimeter security must still apply to an organization’s overall security posture. A layered approach includes the installation and maintenance of effective firewalls that track and monitor network traffic to determine who or what is allowed to access the environment. A starting point is to ensure you’re using a private network with a sufficiently strong and complex password on the router. A critical step further is requiring passwords for all individuals to access the environment, explicitly using strong and unique passwords for each account to avoid credential-stuffing attacks that steal login information to gain access to multiple accounts.

It’s important to also avoid unsecured employee routers, mobile devices, or hotspots, especially ones with public connections, as these introduce unprotected access points and weaken the security chain. Always utilize two-factor authentication, which requires multiple forms of identification to confirm user identity, and deploy and maintain an antivirus software program that can detect and remove various types of malwares, preventing them from penetrating systems or otherwise disrupting the network.

You cannot lose what is not there.

Still, some believe it is an inevitability that a data breach will occur. I do not recommend shifting the focus to plans for recovery rather than on intrusion prevention measures. Although it is crucial to maintain a detailed plan for recovery, that is just one part of the picture. Actively working to prevent breaches can slow the progress of the hackers and minimize the potentially negative impacts of a breach. We have already covered several proven security practices that can be effective at stopping data theft, using practices that align closely with industry requirements for regulatory compliance.

Tokenization can take this process even further by removing sensitive data from the environment altogether. We explain this to our customers very simply: no data, no theft. Due to its superior security, flexibility, and simplicity, tokenization is being widely adopted by organizations around the world to address concerns surrounding data protection and regulatory compliance.

Whether organizations need to satisfy privacy regulations, de-identify the sensitive data sets within systems, or help protect payment information in all its forms, tokenization is highly effective. By replacing data with a non-sensitive token, a breach would fail to yield any valuable or useable information. Tokens are worthless to cybercriminals, as they cannot steal data that is not there. Tokens are also useful in limiting internal risks of unnecessarily exposing data or having it be shared or mishandled. No data, no theft.

KEYWORDS: cyber security cybersecurity preparedness cybersecurity readiness data privacy data protection data security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alex pezold tokenex

Alex Pezold is CEO TokenEx. (Headshot courtesy of Pezold)

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • dataattack

    58% of data backups are failing, creating data protection challenges

    See More
  • Companies are Failing to Get Ahead of the GDPR

    Companies are Failing to Get Ahead of the GDPR

    See More
  • mall decorated for christmas

    Data breach and identity protection concerns are at an all-time high

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing