article thumbnail

How To Improve Incident Response Time for Data Breaches

Smart Data Collective

Take the Marriott data breach in 2014, for example. Before Marriot acquired the Starwood hotel group, Starwood suffered a major data breach of its customer database. Because no internal threat detection mechanisms existed, the malicious actors had access to massive volumes containing personal customer information.

article thumbnail

What Are the Most Important Steps to Protect Your Organization’s Data?

Smart Data Collective

Based on figures from Statista , the volume of data breaches increased from 2005 to 2008, then dropped in 2009 and rose again in 2010 until it dropped again in 2011. By 2012, there was a marginal increase, then the numbers rose steeply in 2014. Data backups and a dependable disaster recovery plan. In summary.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remote Workers Demand Data-Driven Cybersecurity Platforms

Smart Data Collective

Metcalfe’s law tells us that the inherent worth of any communication networks is directly proportional to the number of people sharing data across it. This is why it is important to know how to keep data secure. Aura CEO Hari Ravichandran wrote that, “In 2014, my own credit information was stolen online.

article thumbnail

IBM Emphasizes The Benefits Of Data Analytics For Renewable Energy

Smart Data Collective

Faced with the possible risk of being hacked, Schoklitsch defends that there is a “high degree of security” and that all the data is stored in a Tier IV data server CPD (Data Processing Center) – a classification that guarantees to face the worst technical incidents without ever interrupting the availability of the servers.

IBM cost 244
article thumbnail

Don’t Just Let It Go: Protecting Your Data This Holiday Season

Dataversity

In 2014, my daughter was 10 and was deep in the throes of Frozen-mania. A certain song became seared in all our brains. Disney’s billion-dollar juggernaut consumed every waking moment, and my daughter wanted an Elsa doll to share the experience with.

article thumbnail

Worried about SQLite security vulnerabilities? Keep calm and stay safe.

Actian

Case in point, over the weekend a very serious security vulnerability was discovered in SQLite and the Web bundled version of SQLite in Chromium (the Open Source roots for Google Chrome). There are three major drawbacks of ETL that we find most data architects and developers struggle with: integration cost, performance and data security.

article thumbnail

Goodbye Oracle Discoverer, Hello Next-Generation Reporting

Insight Software

Oracle’s 2014 Statement of Direction laid out its support strategy. Data security and automated conversion of Discoverer reports are other features to look for in a new tool. Such is the case with Oracle Discoverer, one of the primary reporting tools in the Oracle ecosystem.