Surviving the Damages of a Data Breach

by Aug 26, 2020

Categories

Tags

Administration agent-based monitoring Agentless Monitoring alert responses alert thresholds alerting Alerts Amazon Aurora Amazon EC2 Amazon RDS Amazon RDS / Aurora Amazon RDS for SQL Server Amazon Redshift Amazon S3 Amazon Web Services (AWS) Analytics application monitoring Aqua Data Studio automation availability Azure Azure SQL Database azure sql managed instance Azure VM backup Backup and recovery backup and restore backup compression backup status Backup Strategy backups big data Blocking bug fixes business architecture business data objects business intelligence business process modeling business process models capacity planning change management cloud cloud database cloud database monitoring cloud infrastructure cloud migration cloud providers Cloud Readiness Cloud Services cloud storage cloud virtual machine cloud VM clusters code completion collaboration compliance compliance audit compliance audits compliance manager compliance reporting conference configuration connect to database cpu Cross Platform custom counters Custom Views customer survey customer testimonials Dark Theme dashboards data analysis Data Analytics data architect data architecture data breaches Data Collector data governance data lakes data lineage data management data model data modeler data modeling data models data privacy data protection data security data security measures data sources data visualization data warehouse database database administration database administrator database automation database backup database backups database capacity database changes database community database connection database design database developer database developers database development database diversity Database Engine Tuning Advisor database fragmentation database GUI database IDE database indexes database inventory management database locks database management database migration database monitoring database navigation database optimization database performance Database Permissions database platforms database profiling database queries database recovery database replication database restore database schema database security database support database synchronization database tools database transactions database tuning database-as-a-service databases DB Change Manager DB Optimizer DB PowerStudio DB2 DBA DBaaS DBArtisan dBase DBMS DDL Debugging defragmentation Demo diagnostic manager diagnostics dimensional modeling disaster recovery Download drills embedded database Encryption End-user Experience entity-relationship model ER/Studio ER/Studio Data Architect ER/Studio Enterprise Team Edition events execution plans free tools galera cluster GDPR Getting Started Git GitHub Google Cloud Hadoop Healthcare high availability HIPAA Hive hybrid clouds Hyper-V IDERA IDERA ACE Index Analyzer index optimization infrastructure as a service (IaaS) infrastructure monitoring installation Integrated Development Environment interbase Inventory Manager IT infrastructure Java JD Edwards JSON licensing load test load testing logical data model macOS macros managed cloud database managed cloud databases MariaDB memory memorystorage memoryusage metadata metric baselines metric thresholds Microsoft Azure Microsoft Azure SQL Database Microsoft PowerShell Microsoft SQL Server Microsoft Windows MongoDB monitoring Monitoring Tools Monyog multiple platforms MySQL news newsletter NoSQL Notifications odbc optimization Oracle PeopleSoft performance Performance Dashboards performance metrics performance monitoring performance schema performance tuning personally identifiable information physical data model Platform platform as a service (PaaS) PostgreSQL Precise Precise for Databases Precise for Oracle Precise for SQL Server Precise Management Database (PMDB) product updates Project Migration public clouds Query Analyzer query builder query monitor query optimization query performance Query Store query tool query tuning query-level waits Rapid SQL rdbms real time monitoring Real User Monitoring recovery regulations relational databases Releases Reporting Reports repository Restore reverse engineering Roadmap sample SAP Scalability Security Policy Security Practices server monitoring Server performance server-level waits Service Level Agreement SkySQL slow query SNMP snowflake source control SQL SQL Admin Toolset SQL CM SQL code SQL coding SQL Compliance Manager SQL Defrag Manager sql development SQL Diagnostic Manager SQL Diagnostic Manager for MySQL SQL Diagnostic Manager for SQL Server SQL Diagnostic Manager Pro SQL DM SQL Doctor SQL Enterprise Job Manager SQl IM SQL Inventory Manager SQL Management Suite SQL Monitoring SQL Performance SQL Quality SQL query SQL Query Tuner SQL Safe Backup SQL script SQL Secure SQL Security Suite SQL Server sql server alert SQL Server Migration SQL Server Performance SQL Server Recommendations SQL Server Security SQL statement history SQL tuning SQL Virtual Database sqlmemory sqlserver SQLyog Storage Storage Performance structured data Subversion Support tempdb tempdb data temporal data Tips and Tricks troubleshooting universal data models universal mapping unstructured data Uptime Infrastructure Monitor user experience user permissions Virtual Machine (VM) web services webinar What-if analysis WindowsPowerShell

Just about the last thing that any IT organization wants to experience is a data breach. The ramifications of misappropriated data can be severe and long-lasting to both the organization and individuals affected. You might get an argument from some observers who say a disaster that destroys a computing environment is on par or even worse than a data breach.

I disagree with that assessment for a couple of reasons. For one, an enterprise that values its IT systems should have a disaster recovery plan in place that can quickly get them up and running again. Information may be inaccessible for an indeterminate amount of time in a disaster scenario, but it is still intact and will eventually be restored to its previous state. A business must be prepared to withstand the financial repercussions of an extended IT outage.

The second point is that the damage inflicted on an organization in the wake of a data breach is much more unpredictable and potentially far-reaching. It affects not only the organization whose data resources have been breached but also every individual whose information was compromised. There may be financial penalties handed down to the enterprise and compensation might need to be offered to those impacted by the breach. Long-term effects include a loss of customer trust in the safety of their data and compromised personal information that can be very hard to successfully quantify and address.

How Organizations Should React to a Data Breach

When an organization is impacted by sensitive customer or employee data being compromised, its first instinct may to be attempt to minimize the problem by keeping it under wraps. This is not a viable strategy. Here are four steps that every organization that experiences a data breach should perform.

Contain the breach – This step involves determining how the breach occurred and implementing plans to minimize the damage. The actions required depend on the specifics of the breach and may involve shutting down systems until the issue is resolved.

Assess the risks – The scope of the damage caused by the breach is dependent on the type and amount of data that has been affected. A thorough understanding of the data items will identify the possible risks of its misuse and influence who shold be informed of the breach.

Make all necessary notifications – Based on the risk assessment, the affected organization needs to inform the appropriate parties. These may be regulatory agencies as well as the individuals whose data was compromised.

Strengthen defenses – Data breaches point out ineffective or missing measures designed to protect enterprise information assets. Making sure that the organization never falls victim to the same issues again should be a high priority activity.

Protecting Yourself From the Aftermath of a Data Breach

Individuals affected by compromised personal data need to take multiple actions to help mitigate the damage. These steps should be taken as soon as possible to provide the most effective protection against the misuse of sensitive personal data.

  • Verify that the breach has occurred and that your data was involved. Get this information directly from the company that was storing your data.

  • Find out what type of information has been compromised. The loss of more sensitive data like Social Security numbers may need to be addressed in a different way than if it is merely login information for an eCommerce site.

  • Accept any help offered by the breached organization such as free credit monitoring or identity theft protection.

  • Strengthen your online logins and passwords to guard against unauthorized access to other accounts. It’s a good idea to change all of your login credentials as soon as possible.

  • Monitor all of your accounts closely and follow up with the appropriate organizations based on the type of data that was stolen. This may involve filing your taxes early or instituting a credit freeze to thwart criminals from opening new accounts with your credentials.

Protecting Your SQL Servers from Unauthorized Access

Keeping sensitive data safe starts with understanding where this type of information exists in your IT landscape. Without this knowledge, it’s impossible to address the security concerns required to protect enterprise data resources. In large SQL Server environments, it can be difficult to keep tabs on where sensitive personal data is stored and who has access to it.

IDERA’s SQL Compliance Manager can help prevent data breaches by keeping you informed of the state of your SQL Servers regarding the regulatory standards that may be associated with the information in your databases. It can identify who is attempting to access sensitive data and alert against suspicious activity that may put data resources at risk. It also provides extensive compliance reporting capabilities that will assist in meeting internal and external audit requirements.

SQL Compliance Manager lets you audit privileged users to track and report on database access. The tool includes audit templates for many regulatory standards including GDPR, SOX, and HIPAA that can be customized to your specifications. It’s a great tool that will help database teams minimize the potential of data breaches and stay on the right side of the regulatory authorities.