Skip to content

Archived CEO Blogs

Corporate data loss: How bad is it? (Part 2 of 2)

“ We have spent over 12 years building our reputation and trust; it is painful to see us take so many steps back due to a single incident. ”
—Tony Hsieh, CEO, Zappos, after the company suffered a data breach in which 24 million customer records were stolen

Tim Burke

Corporate data loss: How bad is it? (Part 1 of 2)

In the wrong hands, the sensitive data your business depends on becomes a weapon wielded against it. And it’s happening more often every day.

Reports of intellectual property theft and hacktivism abound, and 2011 has been widely described as “the year of the data breach.”

It’s not hard to see why.

In 2011 alone, according to the nonprofit Online Trust Alliance , 126 million data records were compromised in the United States.

Tim Burke

It’s 11 PM … Do you know where your data is?

Just about every day, I hear yet another horror story about data loss.

To my ears, that term — ‘data loss’ — doesn’t do the problem justice. ‘Data loss’ sounds almost innocuous, too much like ‘Gee, I misplaced my gloves, anybody seen them around?’

Tim Burke

Security holes that’ll keep you up at night: Sensitive data in the cloud

Cloud computing that involves processing sensitive or regulated data in shared environments needs extra scrutiny in terms of security (as well as codifying requirements, defining a cloud services contract, managing the transition from in-house to cloud, and overseeing the resulting mixed IT environment).

Cloud security is at risk when…

You don’t have an adequate cloud-oriented governance/risk/compliance framework,
The hypervisors in your virtualized infrastructure harbor vulnerabilities that can be exploited,
It’s possible to infer information about one virtual machine by observing the state of the shared system from another aspect of the underlying system — which might enable malicious code execution, or
When vulnerabilities are introduced by incorrect configuration of a hypervisor and/or its related tools.

Tim Burke

Security holes that’ll keep you up at night: Insecure virtual machine deployment

Rare is the information technology professional these days who doesn’t understand the prodigious efficiencies and savings that can be derived from virtualization . Yet, too often virtual machines are deployed insecurely. One Gartner analyst has estimated that 60% of virtualized servers will be less secure than the physical servers they replace.

That’s because too often virtualization projects tend to be developed and deployed without considering security. This can result in vulnerabilities that enable bad guys to compromise the hypervisor/ virtualization layer (e.g., DoS attacks), which can spread to all hosted workloads.

Tim Burke

Contact Quest Today  ˄
close slider