From students and faculty to business owners and employees, everyone can benefit from learning how to keep their data safe.

Compliant isn't Secure: 4 Steps to Keep Your Data Safe

From students and faculty to business owners and employees, everyone can benefit from learning how to keep their data safe.

Data security starts with compliance. Unfortunately, some companies also believe it ends there.
While compliance with standards such as SOC 2 or PCI can provide baseline protection, it can't magically wall a company off from breaches. It can't spot intrusions as they happen, and it certainly can't stop attacks.

Companies simply can't rely on security frameworks. The best protection — and even it isn't failsafe — is companywide, year-round data governance and awareness. In other words, it's a culture of security.

Compliant Does Not Mean Safe

Security reports sometimes frame breaches as compliance failures. Of the breached companies studied in Verizon’s 2015 PCI Compliance Report, not one was fully PCI DSS-compliant during the attack. Yet all of them thought they were, and some even had third-party certifications to prove it.

How could so many companies assume they were safe — compliant, anyway — and still be so vulnerable? Could it be that compliance frameworks are actually to blame?

Top frameworks are already quite thorough, and they're being added to constantly. SOC 2 contains up to 64 criteria. PCI has more than 250 requirements, as does HIPAA. FedRAMP boasts 325 for the most common system impact level.
The real issue is that data security is a cat-and-mouse game. Audits take place at a single time point. Between them, business changes, technology advances, and hackers discover new vulnerabilities. Processes and technologies that may have been secure last year might now give hackers their "in."

Just a year after Target suffered its breach in 2013, The Home Depot met a similar fate. Both firms had been declared PCI DSS-compliant prior to their respective breaches. Both paid tens of millions in remediation costs. Ultimately, both were breached because they thought compliance was enough. 

To stay secure, companies like The Home Depot need employees to understand what to protect, how to do it, and how their role fits into the broader information security picture.
Create a Culture of Security

Creating a culture of security isn't easy, but no compliance framework can match it for protective power. To prioritize security across your organization:

1. Map out business processes.

Map your data path. Who inputs it? Where is it stored? When and how is it accessed? By exploring your process, you identify areas of exposure.

Don't do this alone. Prioritize high-risk departments, and consult with their managers. You'll likely spot issues immediately, such as employees emailing customer data. According to Dell, 72 percent of employees share confidential information over insecure channels.

2. Create a governance and awareness program.

Establish clear ownership, accountability, and oversight of security and compliance. Don't wait until next year's audit, either. Compliance and risk management must be year-round activities.

If you don’t have a CISO to implement and manage such a program, determine what their role would entail and allocate duties to different groups. If you're a cloud services provider or use cloud services, be sure shared security responsibilities are clearly defined. Above all, ensure someone is charged with educating individuals on their security responsibilities. As it stands, just 10 percent of security professionals’ time is spent on employee education. 

 

 

While employees should understand common social engineering techniques, everyone can't be an expert. Instead, establish technical safeguards and encourage role-based security. If you have extra budget, simulate phishing attempts to gauge awareness.

3. Market your plan internally.

Often, the highest hurdle isn't establishing a data governance program; it's sustaining the program year-round. The key to a governance program that sticks is consistent messaging.
Begin by explaining why internal security measures matter to every employee. What does the improper handling of data look like in each role, and who should each team member report it to? Tap your brand or marketing department to facilitate ongoing communication and workshops, especially with non-technical teams. 

Don’t stop with a few emails, either. Celebrate success, play security-related educational games, and hold post-incident roundtables to assess mistakes. The more visible your efforts are, the stronger buy-in will be.

4. Enable self-service.

If your security culture is to stick, employees must be able to access and use data security tools themselves.

For developers, provide trainings on secure coding and tools to automate code tests. Offer certifications to those who wish to own more security responsibilities.

For the wider company, establish secure communication channels so users don't email sensitive data when issues arise. Use an email client that identifies emails of external origin. The FBI reports that business email breaches have increased by 1,300 percent since 2015.

When it comes to security, compliance isn't enough. Hackers don't quit because your company's site boasts a security seal. Criminals don't care whether your business was audited yesterday, last month, or last year. The only way to spot them before they do damage is with a culture of security.

 

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3