Data Storage Must Be Secured to Protect Privacy

Often times privacy breaches occur because the access controls are not configured appropriately for databases, or inadequate processes weren’t even established to protect data within the network perimeter. Too many organizations still focus almost all of their efforts on securing the typically highly fuzzy and porous perimeter to the exclusion of other highly vulnerable areas. Many incidents can be prevented by putting more attention and time to securing the data storage areas.


One of my friends and colleagues, Kevin Beaver, just finished doing a webcast, “The Three Things You Need to Know About Managing Privacy Data.
Give it a listen if you get some time; Kevin provides some good insights. His views support the recommendations and use of the tools I provide within my Privacy Management Toolkit.

Tags: , , , , , , ,

Leave a Reply