Task

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 7

Data Security: Problems

Major problems in DATA SECURITY.


Data Tampering.
Eavesdropping and Data Theft.
Falsifying User Identities.
Password-Related Threats.
Unauthorized Access to Tables and Columns.
Unauthorized Access to Data Rows.
Lack of Accountability.
Complex User Management Requirements.
Data security: problems and solutions

1. Enterprises lack visibility on what data is being


created, where it resides, and who has access to it.
Some 57% of organizations are creating over 6,500
files containing sensitive data every day. That's a lot of
data, and with it come a lot of complications.
As with that much data being created outdated, or
"stale," data can become a problem, and it is for 91%
of organizations that have over 1,000 pieces of stale
data in their systems.
2. There are too many privileged users
It's easy to get carried away granting permissions to
users so that they can get their jobs done without
trouble, but that could be contributing to this
serious problem.

3. Data management often not in compliance with


government standards
Many organizations were found to be in violation of
laws like GDPR, HIPAA, PCI, and CCPA because of the
above-mentioned stale data statistics and poor user
permission management.
4. Inactive users create a larger attack surface
The report found 71% of organizations have over 1,000
inactive users, and that means an additional 29% could
have nearly that many.
Inactive user accounts that aren't monitored, don't
have their passwords updated, or belong to former
employees and default users are ripe attack vectors.
5. Too many users have non-expiring passwords.
The report found that 31% of enterprises had over
1,000 accounts with passwords that never expire.
If users are duplicating passwords used for personal
accounts, and those accounts are compromised, it's
a short step to an attacker gaining access to your
organization's network.
How to fix the data security shortcomings ?
1.Reduce attack surfaces: Eliminate unnecessary account
privileges, close out inactive users, and eliminate duplicate data
that resides in cached files and backups.
2.Control data access: Audit who has access to what data,
determine whether they need that access, and block access to
those who don't absolutely have to have it.
3.Categorized risks: Sort security risks into categories and rank
them in order of importance to increase visibility and improve
readiness.
4.Integrate solutions: Siloed software means data could be being
duplicated, misplaced, or left unsecure. If you can find a vendor
that offers all the software you need in one package it's a good
idea to consider a move.

You might also like