Skip to main content
  1. Tech
  2. Gadgets & Tech
  3. Tech Gear

How security analysts can protect your data

See also

Here's a common situation. You call your cable company. The agent asks you to verify your phone number, address, date of birth, last four of your social, and your mother’s maiden name. The verification protocol is usually effective.

If someone steals your wallet, the thief probably wouldn't know your mother’s maiden name. If someone hacks your email account, chances are the last four of your social aren’t located there.

Keeping Data Safe

What does big data do to keep us safe?

All the info a customer representative asks us often warehoused in massive databases or in the cloud. If you have a loyalty card, or a line of credit with a company, you'll have lots of personal information stored in a server somewhere.

With the recent security breach involving Target and millions of customers’ information, we’re beginning to understand that security in the world of big data should not be taken lightly. There are plenty of smart hackers who love to breach firewalls.

Given safety concerns, security firm Brickhouse Security has a suite of products that enable parents to monitor their kids' behavior on cellphones, desktops, and laptops. Such monitoring can detect unauthorized access of social media accounts and other inappropriate activity online.

Anticipating Risks

An important step to protect data is to hire IT personnel who are smarter than cyber criminals. Hackers try to outthink security experts.

Big data workers and analysts should be able to anticipate potential breaches and implement security features before it's too late. What's posted on the Web stays on the Web.

If your company isn't ready to shell out the cash for the best equipment, programming, servers, clouds, and other securities solutions equipment, it won't be long before hackers can slip right inside your network.

Securing Networks

Make it the mission of your company to hire the best people for the job of creating security for your customers. Give these employees everything they need to get the job done.

No one wants another catastrophic event like the Target breach in late 2013 -- the data of nearly 70 million customers was compromised.

Let the IT team and data experts within your organization have open dialog and groupthink sessions where they can bounce ideas off each another. Synergy is power.

It's only a matter of time before hackers identify weak links in a network. Make their task difficult.

Contact: Marv Dumon at


Don't Miss

  • Fable
    'Fable Legends' hands-on: A new breed of 'Fable' is here, you should be excited, we are
    Games Preview
  • Microsoft
    Microsoft shuts down entertainment studios on the heels of massive layoffs news
    Tech Buzz
  • Destiny
    The 'Destiny' beta: 7 things we absolutely love about Bungie's new franchise
    Games Feature
  • GoTenna
    GoTenna allows you to send text messages when you have no service
  • Far Cry
    'Far Cry 4' exclusive: Animals, avalanches, oxygen, side content and much more
    Games Interview
  • Facebook
    Facebook releases a mobile app designed for famous people to interact with their fans

Related Videos:

  • Attendees gather at the Apple Worldwide Developers Conference at the Moscone West center on June 2, 2014 in San Francisco, California. Apple CEO Tim Cook kicked off the annual WWDC which is typically a showcase for upcoming updates to Apple hardware and s
    <div class="video-info" data-id="518310091" data-param-name="playList" data-provider="5min" data-url=""></div>
  • Nielsen and Facebook partners to gather Mobile TV viewers information
    <div class="video-info" data-id="518249257" data-param-name="playList" data-provider="5min" data-url=""></div>
  • Apple and IBM Logo
    <iframe width="560" height="315" src="//;allowfullscreen=true&amp;autoplay=1"></iframe>