Softtek Softtek
  • Our experience
  • Overview
  • Insights
  • Blog
  • Newsroom
  • Careers
  • Contact us
softtek Language Selector
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Search button
AI
APPROACH
INDUSTRIES
SERVICES & SOLUTIONS
TRANSCEND
Softtek GenAI
FRIDA AI for Software Engineering
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
Sustainability by Softtek
Softtek
Language selector
search button
AI
Softtek GenAI
FRIDA AI for Software Engineering
APPROACH
Service Transformation
Portfolio Transformation
Digital Acceleration
Our Work
INDUSTRIES
Agribusiness
Airlines
Automotive
Banking & Financial Services
Consumer Packaged Goods
Energy & Utilities
Fitness & Wellness
Gaming
Government & Public Sector
Higher Education
Healthcare
Industrial
Insurance
Media & Entertainment
Oil & Gas
Pharma & Beauty
Professional Sports
Restaurant & Hospitality
Retail
Technology
Telecommunications
Transportation & Logistics
SERVICES & SOLUTIONS
Digital Solutions
Digital Optimization
Digital Sales
Data Masking Solution
IT Cost Optimization
Fan Engagement Ecosystem
Softtek Digital Enablers
DIEGO
blauLabs
Business OnDemand
Click2Sync Omnichannel
Automotive Digital Assistant
Guest Engagement
Socializer
Collaborative Commuting
Workplace Management
Application Services
Software Development
Quality Engineering
Application Management
Application Services
Cloud & DevOps
Cloud Services
IT Infrastructure
Digital Security
DevOps
Data & Automation
Data and AI
Intelligent Automation
Services Transformation
Core Modernization
Next-Gen IT Operations
Platform Services
AWS
SAP
Microsoft
Salesforce
ServiceNow
Atlassian
BlueYonder
TRANSCEND
Sustainability by Softtek
Our experience
Overview
Insights
Blog
Newsroom
Careers
Contact us
ENGLISH
EUROPE / EN
ESPAÑOL
EUROPA / ES
PORTUGUÊS
中文(简体)
Softtek Blog

6 Proven Practices for Organizations to Avoid a Security Breach

Author:
Author Fernando Labastida
Published on:
Jul 20, 2014
Reading time:
Jul 2014
|
SHARE
Share on LinkedIn
Share on X
Share on Facebook
SHARE
Share on LinkedIn
Share on X
Share on Facebook

(Check out the corresponding    )  

Recent high-profile security breaches have raised public concern about how secure their personal information is. In December 2013, Target reported    77 million customer accounts   were compromised, resulting in $24    billion   worth of damage. And at Global Payments    46 million VISA and Mastercard   numbers were stolen, causing $94 million in losses. These hair-raising examples are just the tip of the iceberg pointing to a rising and troubling trend. 

How can you avoid a similar catastrophic event? Softtek has determined six important measures you can take to avoid a security breach, starting with the most critical risks:

MP900448692

1. Implement a formal/documented process for media disposal:  

A business should take all reasonable steps to destroy, or arrange for the destruction of, a customer's records within its custody or control containing personal information which is no longer to be retained by the business by (1) shredding, (2) erasing, or (3) otherwise modifying the personal information in those records to make it unreadable or undecipherable through any means. (Reference from California Civil Code 1798.81)

2. Establish an annual internal/external IT audit

Suppliers must, at minimum, go through an annual IT audit to ensure that its IT security controls are implemented as expected by the company and also to be able to identify any new security flaws. It is recommended to have an external audit company perform this type of review to obtain the perspective of IT security specialists that are outside the supplier’s company.

3. Implement full disk encryption on company laptops

The trend today is the use of mobile devices to access, handle and store data, so it’s crucial to implement security controls in such devices. For laptops specifically it’s critical to implement full disk encryption to protect everything stored on a disk drive in case the drive is lost or stolen. This can also also protect temporary files, deleted files, and even cached memory files. With full disk encryption, the decision of which individual files to encrypt is not left up to users' discretion. This is important for situations in which users might not want or might forget to encrypt sensitive files.

4. Establish controls for databases and operating systems

Database and operating systems controls cover a wide area of IT controls that a company must have in place, which includes: access controls, auditing, authentication, encryption, integrity controls, backups, monitoring and more. It is recommended to have a penetration test performed against databases to identify any security flaws they may present; this way you can assure that the supplier you are dealing with has the appropriate controls in place or be aware of the controls they are lacking. 

5. Document effective process for securing high-privilege accounts

This item is focused on ensuring the supplier has the proper security controls in place for the management of accounts that hold “special” or extra permissions compared to a regular user account (e.g. administrator account). These security controls cover a variety of areas, such as: defined process for provisioning/de-provisioning, ongoing audit process, having a defined password use policy, defined segregation of duties process, and raising employee awareness on the proper use of these types of accounts.

6. Perform external network vulnerability assessment

Some of today’s top security breaches come from within the network and this is based on not having the right security controls in place. This area is very specific by nature and covers many security areas; therefore, it is recommended that the suppliers with whom you do business go through an external vulnerability assessment to ensure that IT specialists can evaluate and report the existing security flaws of the supplier’s network. There are a variety of testing mechanisms (manual & automated) and tools used to perform a network vulnerability assessment, which is why having an independent company assess the supplier’s network is suggested.

We’d love to hear your thoughts - please join the conversation by commenting below, or via    Twitter   or    LinkedIn   .

Interested in this topic? Check out our latest report,    

 

Related posts

Mar 23, 2015
The Premera Blue Cross Hack – An Analysis
Mar 26, 2015
Sacred Heart Health Services, down with 14,000 PHI records
Protecting a company through Bug Bounty Platforms
Mar 15, 2021
Protecting a company through Bug Bounty Platforms

Let’s stay in touch!

Get Insights from our experts delivered right to your inbox!

Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram
Follow us:
Softtek LinkedIn
Softtek Twitter
Softtek Facebook
Softtek Instagram
Softtek Instagram

© Valores Corporativos Softtek S.A. de C.V. 2025.
privacy notice
legal disclaimer
code of ethics
our policies
webmaster@softtek.com