Thursday, July 2, 2009

The threat of online security: How safe is our data?



Internet security is one of the largest challenges faced by most of the companies today. As a business becomes increasingly reliant on data on its systems, it explores further to online security threats such as phishing, Denial-of-service attack, virus, worm and Trojan horse.


According to 2009 Security Threat Report, one new infected web page is discovered every 4.5 seconds. A recent research also shows an increase in SQL injection attacks in 2008, specifically relating to financial services and the online retail industry. It seems that our data is highly explores to online risks. Nowadays, people become increasingly concern about the confidentiality and reliability of their data online.


Various software and systems have been adopted by companies in order to secure consumers’ privacy and build trust among their customers. Let’s us see how companies secure their consumers’ privacy.

  1. Physically Secure Server Location - A major part of data security is physical security of servers and data, with secure access procedures to ensure compliance. This means that only authorized personal can access the servers that store his or her da
  2. Network Security - The entire online service including consumers’ data is protected by the latest firewall protection, intrusion detection systems, and proprietary security products across all segments of our network. If working with third party service providers, the company should constantly test the network for security breaches.
  3. Data Backup - All customer data is continually backed up to local disk as the first level of data protection and every night to an offsite location as part of Disaster Recovery program. This ensures that consumers’ data is safe and their information can be quickly restored in case of a catastrophe.
  4. Application Access - Companies protect customer data by ensuring that only authorized users can access it using their username and password. Account Administrators can assign security rules that define which users in their company or partners have access to the data based on user's roles.
  5. Data Encryption - All data is encrypted in transfer and all access to the service is governed by strict password security policies. All passwords are stored in MD5 hash format, which means they can not be reverse d to the original password and are not readable.
  6. Monitoring and logging - Companies’ service should be continually monitored for security violations attempts and their team receives immediate notification on such violations. Some companies also implement various third party scanning technologies to monitor the service against existing and new threats.

These are common practices that implemented by most companies in order to keep our data safe. Nevertheless, every company may have their own security systems and there is no guarantee that our data is totally free from online threats.


References:


http://www.samanage.com/products/security.html


http://www.readwriteweb.com/archives/top_online_security_threats_for_2009.php


http://www.winweb.com/online-office-saas-software-as-a-service-benefits/online-office-data-communication-security



No comments:

Post a Comment