Whether in real life or in the virtual world of the Internet, the security issues existing in many enterprises are mostly caused by internal staff. The so-called “internal problems” doesn’t derive from hatred to enterprise, many of which are caused by unintentional faults. For example, employees visited the site linked to horse, spyware , adware, such of kind of malicious software will unknowingly downloaded to their computer, and then these programs will be spread within the enterprise network.
Harm caused by the employees to the enterprise, regardless of whether they intend to so, the results of their actions are the same: misuse of the network is likely to cause that the company information system is compromised, confidential information is stolen and the company network is congested and other issues. Once corporate trade secrets are leaked, the assets will suffer huge losses.
Data leakage is a great loss for both employees and the business.
When corporate data leaks, the enterprises are not the only one who suffers loss, the concerning staffs are also the ultimate victims.
In August 2006, the CTO (Maureen Govern) worked for America Online (AOL) resigned; the reason is that AOL had leaked 658,000 anonymous users’ about 20 million Search keyword in three months.
In addition, a researcher and his supervisor of AOL technical research department also left the company owing to data leakage. In order to quell the waves of criticism on the Internet, AOL said it would set up a special team to review the company ‘s customer privacy protection policies.
Data breaches will even make a nation suffer loss, letting the government competence being questioned – British Prime Minister Gordon Brown has been questioned for 2500 people losing information.
In October 2007, the UK HMRC lost two important data discs, in which there is 25 million people sensitive information. In the UK, child welfare subsidies are all directly deposited to the target bank account via transferring, while losing discs saved important personal information.
The losing information involves a great number of UK households, almost all families having children under the age of 16 have lost personal information, and even Prime Minister Gordon Brown family was not spared. Losing information is related to all child welfare subsidies beneficiaries, including 25 million people, 7.25 million families. Almost half of the UK’s confidential information is lost, which contains important bank account content, British Prime Minister Gordon Brown s have been strongly questioned.
Many companies make up some security policies in the database, e-mail and some other aspects of information management, but these policies are just a framework, the effects of which is questionable.
One of the most stressful things for the IT charge men is business-critical data leakage, however leak is really inevitable, because no matter how powerful the technology and equipment are, the enterprise can hardly avoid illegal invasion.
Many enterprises will assign super administrator privileges to admin, such permission is a reflection of the abuse of authority to database. The data environment with such kind of privileges is very dangerous, because it is very easy to be exploited by unscrupulous people, causing critical data loss.
Johnson offers three ideas and suggestions to adequately protect data:
1. In the enterprise, allowing IT operation staffs to assign permissions based on the actual users’ needs is a strenuous and thankless job. Many business executives require IT operation staffs to set the permission of database as “super administrator”, but this requirement is not necessarily consistent with the actual need, which makes IT operation staffs in dilemma.
However, as IT executives, even if you feel very difficult, but I still recommend you to adhere to your principle – related personnel database permissions should match their actual work right, especially you should figure out why some staffs obtain the super privileges.
The management of company must have a clear judgment in this aspect, is it better to firstly regard convenience or the safety? But from all above, we know that in order to stand out from such a competitive market environment, sound and stable security measures are imperative.
You can visit Kakasoft for more information about data security.