Data Security & Fraud Prevention Roundup
Our Data Security & Fraud Prevention Roundup contains links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the last few weeks and our thoughts on them.
#1: Building a Stronger Security Strategy: 6 Tips by Harry Folloder, InformationWeek (May 4, 2015)
Every company needs to have a strategy in place for protection of data - whether that is healthcare information, payment data, Personally Identifiable Information, or any other material that is entrusted to the company. Harry Folloder lays out six starting points and tips to creating and maintaining a strategy for building your data security infrastructure.
#2: Infonetics: Cloud Security Services Market on the Rise by Elizabeth Montalbano, The VAR Guy (May 7, 2015)
Good news for businesses seeking to take their data to the cloud: it's only getting easier. As more cloud security companies grow and enhance their service offerings, businesses of all industries can more easily leverage the cloud for a secure and convenient way to process, manage, and store data. This article discusses a recent report on cloud growth and what it means for the market.
#3: 6 Ways to Combat Internal Threats to Data Security by Mary A. Chaput, CFO (May 7, 2015)
Healthcare CFOs are faced with a continuous challenge of keeping the Personally Identifiable Information of patients and healthcare workers secure. With the increasing interconnectedness of data sharing across healthcare networks, how do CFOs protect this information? Author Mary A. Chaput outlines the tools in CFO's arsenals that will help avoid data breaches from every angle.
#4: Your Guide to Compliance in the Cloud by Ed Tittel and Kim Lindros, CSO Australia (May 11, 2015)
Even though cloud data security is new, it is still subject to all the regulations and standards that physical security infrastructures are built around. Making sure that your cloud provider holds itself to the high standards of data security regulatory agencies is an important step of migrating your security structure to the cloud. Looking for a fully compliant cloud solution? VirtuCrypt offers the highest level of security for protecting your cryptographic needs in the cloud.
#5: 3 Security Questions to Ask when Vetting a Vendor that Needs Company Data by Beth Weeks, The Enterprisers Project (May 11, 2015)
Studies show that a consistent number of data breaches every year are caused by third party vendors. When working with vendors outside of your company, it’s not easy to control the path that sensitive data takes, so organizations need to think carefully about who they do business with. Beth Weeks offers some helpful questions for CIOs considering doing business with an outside vendor.
If you find something interesting that you’d like to see considered for our next Data Security & Fraud Prevention Roundup, don’t hesitate to let us know. We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices. Send your best links to [email protected], or share them with us on Twitter (@Futurex).