Cyber Security Threats 2016 – Part 3

Monday ~ Monday! Awesome people we are moving into “Hacks Targeting User Data” and it would be hard to miss the hack of shhhhh! Ashley Madison website that made headlines this past summer and not to mention dropped a name or two, yikes! Then T-Mobile, Experian and VTech it makes one wonder, who’s watching the store.
Let’s consider Big Data requires new tools to filter traffic and secure networks. More then just authenticating access once, keeping track of the coming and going and any suspicious behavior.
Analyzing the anomalies in your network is highly recommend and asking yourself is there encrypted data or suspicious behavior? Who is logging in and out, what is being accessed?
Suspicious activity using a transaction monitor, SQL server logs, application logs, or network session data?
Has your server been manipulated or configurations changed. Is everything still in compliance with security policies?
Are there any changes in the infrastructure configuration management and vulnerability and is everything in compliance with your security policy?
Analyze everything, consolidate risk and protection, choose your data sources and anonymize your data traffic. These are just some of the ways big data is changing enterprise security. Keep developing security strategies that target big data weaknesses.
Till next time, Keep your eye on the store!