Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Tech Gear

How security analysts can protect your data

See also

Here's a common situation. You call your cable company. The agent asks you to verify your phone number, address, date of birth, last four of your social, and your mother’s maiden name. The verification protocol is usually effective.

If someone steals your wallet, the thief probably wouldn't know your mother’s maiden name. If someone hacks your email account, chances are the last four of your social aren’t located there.

Keeping Data Safe

What does big data do to keep us safe?

All the info a customer representative asks us often warehoused in massive databases or in the cloud. If you have a loyalty card, or a line of credit with a company, you'll have lots of personal information stored in a server somewhere.

With the recent security breach involving Target and millions of customers’ information, we’re beginning to understand that security in the world of big data should not be taken lightly. There are plenty of smart hackers who love to breach firewalls.

Given safety concerns, security firm Brickhouse Security has a suite of products that enable parents to monitor their kids' behavior on cellphones, desktops, and laptops. Such monitoring can detect unauthorized access of social media accounts and other inappropriate activity online.

Anticipating Risks

An important step to protect data is to hire IT personnel who are smarter than cyber criminals. Hackers try to outthink security experts.

Big data workers and analysts should be able to anticipate potential breaches and implement security features before it's too late. What's posted on the Web stays on the Web.

If your company isn't ready to shell out the cash for the best equipment, programming, servers, clouds, and other securities solutions equipment, it won't be long before hackers can slip right inside your network.

Securing Networks

Make it the mission of your company to hire the best people for the job of creating security for your customers. Give these employees everything they need to get the job done.

No one wants another catastrophic event like the Target breach in late 2013 -- the data of nearly 70 million customers was compromised.

Let the IT team and data experts within your organization have open dialog and groupthink sessions where they can bounce ideas off each another. Synergy is power.

It's only a matter of time before hackers identify weak links in a network. Make their task difficult.

Contact: Marv Dumon at marvin.dumon@gmail.com

Advertisement

Don't Miss

  • Crew
    'The Crew' preview: Ubisoft has on its hands the 'Destiny' of racing games
    Games Preview
  • Cell phone
    A bill legalizing unlocking phones has passed Congress and is expected to be signed into law
    Video
    Tech Buzz
  • Crew
    'The Crew' exclusive: Details on in-game servers, leveling up and online play
    Games Interview
  • Comic Con
    See 10 defining moments from the 2014 San Diego Comic-Con
    Camera
    10 Photos
  • Unity Exclusive
    'Assassin's Creed Unity' exclusive: Tell the world, 'I'm coming home'
    Camera
    Games Interview
  • Typing
    Is your brokerage account safe from the attacks of cyber thieves?
    Video
    Headlines

Related Videos:

  • Shark Week 2014
    <iframe width="560" height="315" src="//www.youtube.com/embed/04EXlOSa280?VQ=HD720&amp;allowfullscreen=true&amp;autoplay=1"></iframe>
  • Twitter
    <div class="video-info" data-id="517839330" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=517839330&autoStart=true"></div>
  • Google research
    <div class="video-info" data-id="518340583" data-param-name="playList" data-provider="5min" data-url="http://pshared.5min.com/Scripts/PlayerSeed.js?sid=1304&width=480&height=401&playList=518340583&autoStart=true"></div>