Sensitive, personally identifiable information (PII) such as names, account numbers, trading and other financial information are collected and used for virtually every customer and internal corporate function: HR; marketing; sales; customer support; technical support; product development; investor relations; regulatory compliance … the list goes on. Companies also handle sensitive data related to intellectual property (IP)…
Tag: data breach
3 Common Sense Strategies for Managing Financial Data
While it has always been vital for entities handling financial information — account identifiers, investment records, account balances, transaction fees, payment card information, credit reports, and the like — to take appropriate privacy and data security precautions, never before has it been quite the pressing concern that it is today. The rapid deployment of innovative…
Do We Need a National Data Security Bill?
There is only one primary driver for investing in security and that is the threats to your data and computing infrastructure. However, a secondary driver that often overshadows even the threats is compliance. More Articles from Richard Stiennon on CIO Update Network Admission Control is a Blind Alley Lessons Learned from Biggest Bank Heist in…