Data security accountability in an age of regular breaches

Data security accountability in an age of regular breaches
As the number of vendors impacted by supply-chain breaches grows, one constant question remains: where exactly does accountability for data security lie, and what part do end users play in their own data breach protection?

Implicit trust is an unfortunate, yet necessary requirement


Conducting business today frequently requires a potential client or customer to provide considerable amounts of personal information to facilitate most any transaction. At the very least, this includes some form of identification, along with corresponding payment information. Depending upon the type of purchase, additional authentication and verification may be necessary. Such a scenario frequently demands implicit trust that the vendor in question will facilitate the secure handling of all pertinent client information – unfortunately, the reality is this is far from a guarantee.


Comprehensive data protection is a challenge for even the most security conscious organizations. At some point, each organization is fundamentally reliant upon the security of the products and solutions that comprise their respective technological ecosystems. Supply chain attacks such as SolarWinds seek to create as large a fallout as possible by targeting these very products and solutions. In the face of sophisticated nation-state backed attack campaigns, even the most data protection centric organizations with dedicated incident response teams and security operation centers will struggle to protect information from compromise and exfiltration.


Individual accountability is an essential component


When it comes to information security, cyber hygiene is remarkably analogous to biological hygiene. Much like the immune system within an organism, poor digital security hygiene can result in an infection (security incident) progressing into a full-blown compromise (data breach). The expectation is that the breached organization will take active measures to mitigate the effects of the data breach, and it ends there. However, this is not enough. Mu ..

Support the originator by clicking the read the rest link below.