Data security needs strategy

Sport Business News

Following the recent Info Security Exhibition/Conference in London, Alf Raju, chief information and technology officer of Major Events International, provides his thoughts on the current state of the security industry as it relates to data security.

The event did not seem not raise the expectations as one would expect in this current climate of Data Security, given the biggest story so far this year is one of incompetence at McAfee, a company which one might expect to be leading the way in security. There are lots of security firms from the established large companies to the smaller ones, who in particular have names that really do not strike a chord with security. In addition to this they have commissioned surveys to prove that users are unaware of the dangers of the cloud, or over cautious about social media, or data breaches and the associated penalties, and therefore buy their products. The Mobility landscape can lead in this change of attitude of users and vendors alike, where the move towards two factor authentication and, or the use of secure tokens that are not new but provisioned in a manner that does not require the carrying of a physical token, e. g. using MobileGov Access, Crypto card, Relay Server & Afaria solution from Sybase. However, even with the increase in Mobility, there is a need for a coherent security strategy that covers the data integrity from wherever and however it accessed and used. Well–defined security policies should be aiming to reduce risks and highlight opportunities, mitigate the security risks and remove the business threat and Morph Mobility from A Business Threat to an Enabler. The problem is people and there have been many instances of documents/laptops left in cabs, or that people write their username and passwords down, or give them away through phishing scams such as a government minister having his twitter account phished!A recent quote from RedMonk analyst Michael CotÉ, "IT security needs to add remedial services to its repertoire. Since security breaches are inevitable, damage control is perhaps more important than ever. "

Additional information