The Sony Pictures attack and subsequent release of information was a big surprise to many, and illustrated that much damage could be done without stealing credit card information. This should make every board take notice, and start thinking about what could hurt their organization if it were compromised and displayed for all to see. Email conversations are a great example; what do you think is buried in your messages that you would not want shared with the world? This includes personal and business email in most cases. Companies have to guard against disclosure as well as loss across a broad range of information sources. A full assessment is recommended that thinks deeply about what is important to protect, and additional security should be put in place for those items. By differentiating and segmenting what is important, more dollars can be allocated to the important areas.
There are 5 key comprehensive solutions that should be developed to insure that the truly important information assets are better protected.
- Enhanced Administration
- Greater Encryption
- Multi-Factor Authentication
- Web Leak Monitoring