News / Security /

Data Protection Becomes Top Concern as More Businesses Use Third-Party IT Systems


Today’s IP news roundup highlights some of the latest headlines in big data, network security and more:

  • By 2019, 90% of organizations will have personal data on IT systems that they don’t own or control. With this in mind, Gartner has outlined steps you can take to safeguard your data. According to Gartner (as reported by The VAR Guy), you should favor purpose-built over general-purpose applications. This is because “any technology that processes personal data in the same way it processes non-personal data ultimately puts that data at risk. Business decisions based on data are easier if employee performance information is stored in an HR management system, customer information is stored in a CRM system and financial and business information is stored in an ERP system.”  For more information on how to protect your personal data, see The VAR Guy article.
  • If you’ve ever wanted to spy on your employees or competitors, you may already have the necessary tools at your disposal. According to a Computerworld article, the technology that the US government used to gather NSA intelligence is available to everybody. The article explains how to use tools such as Google and social media filters to collect and analyse massive amounts of data. For more information on launching your own NSA spying program, see Computerworld.
  • What should you look for in virtualization hardware? According to the SearchServerVirtualization blog, “Once upon a time, your average server had 2 GB, perhaps 4 GB, or even more rarely 8 GB of RAM. Today even your basic VDI desktop uses more than that.” With that in mind, the blog has published a list of things to look for in virtualization hardware that supports this growing amount of RAM. According to the blog, you should not only look for how much RAM the server will hold, but also how much solid-state storage it will hold. For more tips on what to look for in virtualization hardware, see the SearchServerVirtualization blog.
  • Failure of deployments is the most common security vulnerability in enterprise databases, according to a Dark Reading report. The report states, “The most common cause of database vulnerabilities is the lack of care with which they are deployed. Sure, databases are often functionally tested to make sure they provide core functions for calling applications. In fact, the majority of predeployment tests are designed to verify that a database is doing what it should do; very few are checking to ensure that it isn’t doing something it should not do.” For more enterprise database vulnerabilities, see Dark Reading.
  • And finally … as big data gets bigger, you should start planning for yottabytes. A yottabyte is a billion petabytes. According to Forbes.com, most calculators can’t display a number of this size. However, many businesses will soon need access to this amount of data storage. Forbes.com recommends that you estimate how much data you have and then multiply the number by a thousand, as most businesses underestimate the amount of data they collect. For more information, see Forbes.com.

What is your take on today’s news? Feel free to share your opinions below.

Comments are closed.