While the technical aspects of data security are the same throughout the world, regulations differ from nation to nation. No country is safe from hackers and bad actors in today’s cyber-world. In September 2019, a data breach resulted in stolen data from citizens in Ecuador, and similar incidents have occurred in both Panama and Australia earlier in the year. The United States is still the number one country in terms of targets, due to the amount of data requested and collected by many companies. Instead, our solution places protections on the data itself – adding an extra level of protection to ensure that sensitive data can’t be read or exploited, even if a hacker manages to bypass anti-virus software and other protective measures. If an attacker was able to take over an end-point and then request sensitive data held by a company, any data they received could not be exploited.Ĭomforte AG does not put in additional controls at each layer of the cybersecurity defense landscape. As discussed above, comforte AG provides an extra layer of security beyond this, by ensuring that sensitive data is not stored in clear text form. Even if a hacker gains access to your data, it can’t be exploited.Įnd-point-protection software solutions look to prevent malware or bad-intended code being executed on end-points, which can access sensitive data. In the same way that comforte AG protects against spyware and viruses, we deliver a data-centric solution that protects sensitive data in clear text form. However, it’s vital to address what might happen if a phishing or smishing attempt does succeed. These include using anti-phishing and anti-smishing products, as well as offering training classes to educate employees to be less susceptible to attacks. There are common-sense actions that companies can take to stop successful phishing and smishing attempts. Anonymizing sensitive data is more than reasonable – it is highly effective!Īddressing phishing, smishing, and unsecured access points At a minimum, data privacy laws and standards state that organizations must have ‘reasonable data security’ in place. This extra layer of protection enables companies to take a step towards meeting the compliance and regulatory requirements of data privacy laws and standards. Think of comforte as additional insurance for when your existing security layers fail. Anti-virus and spyware software solutions become stronger anti-phishing and smishing solutions become stronger firewall and perimeter defenses become stronger – because the small amount of risk that these solutions have (if and when an attacker is able to get past) are then protected by comforte’s second layer of sensitive data anonymization. The rest of your company’s security layers immediately receive a reduction in risk. The value companies receive are two-fold: Our universal solution transforms sensitive data – including names, social security or tax ids, credit card numbers, user ids and email addresses – into random characters which have no meaning. This wouldn't be considered a data breach by data privacy regulations such as GDPR, nor by privacy professionals.Ĭomforte’s data-centric solution does just that – it anonymizes and protects sensitive data, wherever and whenever it is used. Imagine the letters used in the board game ‘Scrabble’ dumped all over the floor, exposed for the world to see. Removing the word ‘sensitive’ and replacing it with ‘random’ produces a “data breach of random data”. Unlike most other solutions, comforte protects the most sensitive and valuable asset held by any company – their data.Ī data breach happens when sensitive data is found and exfiltrated (on purpose or by accident). How comforte is helping to combat data breaches
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |