Enterprising Developments

How to Avoid Your Own 'WikiLeaks'

Joe McKendrick
Insurance Experts' Forum, December 13, 2010

Recently, in my work with Unisphere Research, I had the opportunity to work on surveys of both Oracle and Microsoft SQL Server database managers and administrators on the issue of data security. 

For the record, it wasn't even really important that these were groups working with technology from two major platform providers who provide an abundance of security solutions. You can have the best technology in the world, but security gaps will still arise if your information is not managed and stewarded in a careful way.  In fact, the surveys found a culture of complacency hampers information security efforts, and as a result of lax practices and oversight, is leaving sensitive corporate data vulnerable to tampering and theft.

What happened in WikiLeaks? A U.S. Army private with security clearance had downloaded huge volumes of sensitive material. As a result, the military has cracked down on removable media.  Similar things have happened before. PrivacyRights.org reports that in another recent incident, an employee at the General Services Administration of the U.S. government sent an email with the names and Social Security numbers of the entire staff of 12,000 GSA employees to a private, outside address. 

If you look at the long, long list of data breaches at PrivacyRights.org, you will begin to notice a common and recurring theme among many data security breach incidents. Namely, a lot of employees and outside contractors had access to personal identifiable information – including Social Security and credit card numbers – and either maliciously walked away with it, or simply carelessly left it in their cars, or on laptops, that eventually were stolen.

Employee awareness training and well-communicated policies may help stem some of these risks. Auditing and monitoring also helps, but usually only catches breaches after they occur. Organizations can be proactive and render the data useless to prying eyes as well, by encrypting, masking, or de-indentifying the data.  However, most companies in the two surveys, covering 761 SQL Server and 430 Oracle sites, do not protect data at this level. (View my Webcast on the PASS findings here.) 

Remarkably, about a third of the data managers in the survey were not even aware of what information security strategies were in place within their enterprises, nor what kind of budgets were available.  This suggests a severe disconnect between management commitment and what needs to be done. 

Joe McKendrick is an author, consultant, blogger and frequent INN contributor specializing in information technology.

Readers are encouraged to respond to Joe using the “Add Your Comments” box below. He can also be reached at joe@mckendrickresearch.com.

This blog was exclusively written for Insurance Networking News. It may not be reposted or reused without permission from Insurance Networking News.

The opinions of bloggers on www.insurancenetworking.com do not necessarily reflect those of Insurance Networking News.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

What It Takes to Have a Tech-Savvy Workplace

The tools and technologies to build the next workplace are available, but not common yet in corporate settings.

Avoiding the Bermuda Triangle of Data

Handled poorly, questions around data ownership, data quality and data security can sidetrack big data conversations and alienate business stakeholders.

Global Supply Chain, Local Problem

As a technology provider, your client’s ability to deliver products and services to their customers, when and where they need them, is at the heart of their business success.

Legacy Systems Are Increasingly a Competitive Handicap

Legacy systems, while reliable, increasingly hold insurers back, a new study finds

Five Reasons to Software-Define Your Operations

It may be possible to provision key services with the click of a mouse, but benefits go well beyond that.

From Her to Watson, and What’s Next?

Imagine a learning system that can replace the performance of your best employee to provide the same level of support across the organization.