• Contact Editorial Team
  • Advertise on YNOT
  • Submit PR
Saturday, February 7, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home Adult Industry News from YNOT Adult Business News

Data Threats Change, but Security Essentials Don’t

Marty O'Brien by Marty O'Brien
July 21, 2017
in Adult Business News
491
SHARES
Share on FacebookShare on Twitter

Know what information you have, solicit and keep only what you need, promptly dispose of material no longer relevant and create an incident response plan.There’s little doubt information security is among the most serious — and most sensitive — issues facing online businesses. Ask those whose secrets were exposed during the notorious Ashley Madison security breach how lax security can change a person’s life. Ask Hillary Clinton’s 2016 presidential campaign about the potential repercussions of flawed security protocols.

New threats to data arise almost daily, and old threats become more sophisticated. Nevertheless, the fundamentals of data protection remain constant: Know what information you have, solicit and keep only what you need, promptly dispose of material no longer relevant and create an incident response plan.

The U.S. Federal Trade Commission is tasked with overseeing commercial data security and prosecuting companies whose sensitive consumer files escape due to negligence. The agency’s free booklet, Start with Security: A Guide for Business, lists 10 points all businesses should consider when designing security protocols.

Factor in security from the start, in every area of your business. Make conscious decisions about the type of information you collect, how long you keep it and who can access it.

Control access to data — not only by outsiders, but also within the company. Private information should be available to employees only on a need-to-know basis.

Insist on complex and unique passwords and store them securely. Despite warnings and a plethora of horror stories about how using the same password in multiple places can create utter chaos, users continue to make the mistake. Consider auto-generating passwords or two-factor authentication. In addition, thwart brute-force attacks by limiting the number of login attempts before locking an account. Ensure authentication protocols cannot be bypassed.

Store and transmit sensitive information securely. Use strong encryption to guard against accidental exposure of sensitive files.

Segment your network. Keep sensitive data on an entirely separate server that has been hardened against known — and even postulated — threats. Monitor access to the data repository.

Limit remote access and ensure endpoint security. A network is only as secure as the weakest node.

Implement security from the ground up in new products and services. Weak code is a primary vector for attack. Before a product is released, test for common vulnerabilities and verify privacy features work.

Ensure service providers practice impeccable security. Financial processors and mailing services should be well vetted and willing to guarantee compliance with industry regulations in writing.

Frequently evaluate and update policies, procedures and software. The recent WannaCry assault on government systems worldwide exploited unpatched software. Stay informed about current and rising threats — and don’t forget about old ones. Redesigned bugs have returned from the dead to wreak havoc anew, often with even more catastrophic results.

Establish alert and response protocols. If the worst happens, know what to do. Figure out when and how the breach occurred and take immediate action to contain the damage. If consumer data was stolen, notify consumers as soon as possible.

 

Tags: cybersecuritydata securityFederal Trade CommissionFTC
Share196Tweet123
Marty O'Brien

Marty O'Brien

Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.

Related Posts

Elizabeth Skylar Launches Elizabeth Skylar VR Studio
Porn Star & Adult Talent News

Elizabeth Skylar Launches Elizabeth Skylar VR Studio

February 6, 2026
Squirt Launches Its First Mobile App in the U.S.
Adult Business News

Squirt Launches Its First Mobile App in the U.S.

February 6, 2026
Steven Grooby Inducted to AVN Hall of Fame
Adult Business News

Steven Grooby Inducted to AVN Hall of Fame

February 6, 2026
Adult Business News

Can the San Jose rally by sex workers and advocates change Super Bowl enforcement plans?

February 5, 2026
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

Elizabeth Skylar Launches Elizabeth Skylar VR Studio

Elizabeth Skylar Launches Elizabeth Skylar VR Studio

February 6, 2026
Squirt Launches Its First Mobile App in the U.S.

Squirt Launches Its First Mobile App in the U.S.

February 6, 2026

‘Dirty Books’ Immersive Play Examines 1960s Obscenity Laws

February 6, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites
  • AI Girlfriend

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Adult Business News
  • Adult Industry Legal News
  • Adult Novelty News
  • Porn Star & Adult Talent News
  • Tech News for Adult Webmasters
  • Video Game News for Adults
  • Interviews
  • Opinions
  • YNOT Industry Wire
  • Newsletters

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.