From students and faculty to business owners and employees, everyone can benefit from learning how to keep their data safe.

Compliant isn't Secure: 4 Steps to Keep Your Data Safe

From students and faculty to business owners and employees, everyone can benefit from learning how to keep their data safe.

Data security starts with compliance. Unfortunately, some companies also believe it ends there.
While compliance with standards such as SOC 2 or PCI can provide baseline protection, it can't magically wall a company off from breaches. It can't spot intrusions as they happen, and it certainly can't stop attacks.

Companies simply can't rely on security frameworks. The best protection — and even it isn't failsafe — is companywide, year-round data governance and awareness. In other words, it's a culture of security.

Compliant Does Not Mean Safe

Security reports sometimes frame breaches as compliance failures. Of the breached companies studied in Verizon’s 2015 PCI Compliance Report, not one was fully PCI DSS-compliant during the attack. Yet all of them thought they were, and some even had third-party certifications to prove it.

How could so many companies assume they were safe — compliant, anyway — and still be so vulnerable? Could it be that compliance frameworks are actually to blame?

Top frameworks are already quite thorough, and they're being added to constantly. SOC 2 contains up to 64 criteria. PCI has more than 250 requirements, as does HIPAA. FedRAMP boasts 325 for the most common system impact level.
The real issue is that data security is a cat-and-mouse game. Audits take place at a single time point. Between them, business changes, technology advances, and hackers discover new vulnerabilities. Processes and technologies that may have been secure last year might now give hackers their "in."

Just a year after Target suffered its breach in 2013, The Home Depot met a similar fate. Both firms had been declared PCI DSS-compliant prior to their respective breaches. Both paid tens of millions in remediation costs. Ultimately, both were breached because they thought compliance was enough. 

To stay secure, companies like The Home Depot need employees to understand what to protect, how to do it, and how their role fits into the broader information security picture.
Create a Culture of Security

Creating a culture of security isn't easy, but no compliance framework can match it for protective power. To prioritize security across your organization:

1. Map out business processes.

Map your data path. Who inputs it? Where is it stored? When and how is it accessed? By exploring your process, you identify areas of exposure.

Don't do this alone. Prioritize high-risk departments, and consult with their managers. You'll likely spot issues immediately, such as employees emailing customer data. According to Dell, 72 percent of employees share confidential information over insecure channels.

2. Create a governance and awareness program.

Establish clear ownership, accountability, and oversight of security and compliance. Don't wait until next year's audit, either. Compliance and risk management must be year-round activities.

If you don’t have a CISO to implement and manage such a program, determine what their role would entail and allocate duties to different groups. If you're a cloud services provider or use cloud services, be sure shared security responsibilities are clearly defined. Above all, ensure someone is charged with educating individuals on their security responsibilities. As it stands, just 10 percent of security professionals’ time is spent on employee education. 

 

 

While employees should understand common social engineering techniques, everyone can't be an expert. Instead, establish technical safeguards and encourage role-based security. If you have extra budget, simulate phishing attempts to gauge awareness.

3. Market your plan internally.

Often, the highest hurdle isn't establishing a data governance program; it's sustaining the program year-round. The key to a governance program that sticks is consistent messaging.
Begin by explaining why internal security measures matter to every employee. What does the improper handling of data look like in each role, and who should each team member report it to? Tap your brand or marketing department to facilitate ongoing communication and workshops, especially with non-technical teams. 

Don’t stop with a few emails, either. Celebrate success, play security-related educational games, and hold post-incident roundtables to assess mistakes. The more visible your efforts are, the stronger buy-in will be.

4. Enable self-service.

If your security culture is to stick, employees must be able to access and use data security tools themselves.

For developers, provide trainings on secure coding and tools to automate code tests. Offer certifications to those who wish to own more security responsibilities.

For the wider company, establish secure communication channels so users don't email sensitive data when issues arise. Use an email client that identifies emails of external origin. The FBI reports that business email breaches have increased by 1,300 percent since 2015.

When it comes to security, compliance isn't enough. Hackers don't quit because your company's site boasts a security seal. Criminals don't care whether your business was audited yesterday, last month, or last year. The only way to spot them before they do damage is with a culture of security.

 

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3