Skip to content

Cyber Security Threats 2016 – Part 3

February 1, 2016

Monday ~ Monday!  Awesome people we are moving into “Hacks Targeting User Data” and it would be hard to miss the hack of shhhhh! Ashley Madison website that made headlines this past summer and not to mention dropped a name or two, yikes! Then T-Mobile, Experian and VTech it makes one wonder, who’s watching the store.

Let’s consider Big Data requires new tools to filter traffic and secure networks. More then just authenticating access once,  keeping track of the coming and going and any suspicious behavior.

Analyzing the anomalies in your network is highly recommend and asking yourself is there encrypted data or suspicious behavior?  Who is logging in and out, what is being accessed?

Suspicious activity using a transaction monitor, SQL server logs, application logs, or network session data? 

Has your server been manipulated or configurations changed. Is everything still in compliance with security policies?

Are there any changes in the infrastructure configuration management and vulnerability and is everything in compliance with your security policy?

Analyze everything, consolidate risk and protection, choose your data sources and anonymize your data traffic.  These are just some of the ways big data is changing enterprise security. Keep developing security strategies that target big data weaknesses.

Till next time, Keep your eye on the store!

 

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: