YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Data Threats Change, but Security Essentials Don’t

Posted On 21 Jul 2017
By : Marty O'Brien

Know what information you have, solicit and keep only what you need, promptly dispose of material no longer relevant and create an incident response plan.There’s little doubt information security is among the most serious — and most sensitive — issues facing online businesses. Ask those whose secrets were exposed during the notorious Ashley Madison security breach how lax security can change a person’s life. Ask Hillary Clinton’s 2016 presidential campaign about the potential repercussions of flawed security protocols.

New threats to data arise almost daily, and old threats become more sophisticated. Nevertheless, the fundamentals of data protection remain constant: Know what information you have, solicit and keep only what you need, promptly dispose of material no longer relevant and create an incident response plan.

The U.S. Federal Trade Commission is tasked with overseeing commercial data security and prosecuting companies whose sensitive consumer files escape due to negligence. The agency’s free booklet, Start with Security: A Guide for Business, lists 10 points all businesses should consider when designing security protocols.

Factor in security from the start, in every area of your business. Make conscious decisions about the type of information you collect, how long you keep it and who can access it.

Control access to data — not only by outsiders, but also within the company. Private information should be available to employees only on a need-to-know basis.

Insist on complex and unique passwords and store them securely. Despite warnings and a plethora of horror stories about how using the same password in multiple places can create utter chaos, users continue to make the mistake. Consider auto-generating passwords or two-factor authentication. In addition, thwart brute-force attacks by limiting the number of login attempts before locking an account. Ensure authentication protocols cannot be bypassed.

Store and transmit sensitive information securely. Use strong encryption to guard against accidental exposure of sensitive files.

Segment your network. Keep sensitive data on an entirely separate server that has been hardened against known — and even postulated — threats. Monitor access to the data repository.

Limit remote access and ensure endpoint security. A network is only as secure as the weakest node.

Implement security from the ground up in new products and services. Weak code is a primary vector for attack. Before a product is released, test for common vulnerabilities and verify privacy features work.

Ensure service providers practice impeccable security. Financial processors and mailing services should be well vetted and willing to guarantee compliance with industry regulations in writing.

Frequently evaluate and update policies, procedures and software. The recent WannaCry assault on government systems worldwide exploited unpatched software. Stay informed about current and rising threats — and don’t forget about old ones. Redesigned bugs have returned from the dead to wreak havoc anew, often with even more catastrophic results.

Establish alert and response protocols. If the worst happens, know what to do. Figure out when and how the breach occurred and take immediate action to contain the damage. If consumer data was stolen, notify consumers as soon as possible.

 

About the Author
Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.
  • google-share
Previous Story

Pining for Less Freedom, in the Name Of Decency

Next Story

Sex-positive Union: Good Vibrations Acquires Babeland

Related Posts

Federal Trade Commission FTC

‘Click to Cancel’ – FTC Announces New Rules for Recurring Subscriptions

Posted On 18 Oct 2024
, By GeneZorkin
Federal Trade Commission FTC

FTC Warnings a Reminder to Influencers: Mind Those Disclosure Rules

Posted On 27 Nov 2023
, By GeneZorkin
Federal Trade Commission FTC

FTC Rulemaking Targets “Commercial Surveillance” and Ad Tech

Posted On 17 Aug 2022
, By Michael McGrady

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • ComeShootMe
    Photographers and Videographers
  • Employment Lawyers Group
    Legal Services
  • Rob Scott
    Web Design & Templates
  • Premiere Listing

    Clickadu – Your trusted traffic souce

    More Details

RECENT

POPULAR

COMMENTS

Beth McKenna Announces Latest Collaboration with "College Girls Reunion"

Posted On 16 Jun 2025

Ricky’s Room Bows Stunning New Anna Claire Clouds DP Scene

Posted On 16 Jun 2025

Ria Bentley Unveils Hot New Scene with Masculine Jason

Posted On 16 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy