• Home
  • Contact Us!
  • Privacy Policy

Radio Metta

  • Home
  • Business
  • Education
  • Health
  • Home Deco
  • News
  • Real Estate
  • Technology
  • Contact Us!
  • Privacy Policy
Home» Technology»5 ways to properly secure new technology

5 ways to properly secure new technology

Loknath Das 19 Mar 2019 Technology Comments Off on 5 ways to properly secure new technology 895 Views

Image result for 5 ways to properly secure new technologyData breaches are not unique to the University of Washington Medicine (UW). In 2018, US companies experienced 12,449 data breaches, a 424% increase over 2017.

In UW Medicine’s case, the breach was due to an internal human error that occurred when data was moved from one server to another.

“We have seen a large number of breaches and failures due to human error, and it’s time for it to stop,” said Robert Reeves, Co-founder and CTO of Datical, which provides database release automation solutions.

“When GitLab’s production database went down, the company took three days to restore it, and users were unable to fully manage their source code,” Reeves continued. “The AWS S3 outagewas caused by a manual typing error, which brought down several websites that relied on S3. Of course, the most widely known data breach was Equifax, where they didn’t patch Apache Struts, due to no automation for application release and updates.”

Table of Contents

Toggle
  • Preventing human error
    • 1. Mandate corporate security standards are applied to any new technology before deployment.
    • 2. Secure C-level and board support for universal application of security standards
    • 3. Automate security process whenever possible
    • 4. Continuously improve security as threats change
    • 5. Link IT security management with the organization’s overall risk management assessments

Preventing human error

So what lessons were learned from these security breaches?

“Humans often overestimate their abilities and make mistakes,” said Reeves. “Or, even worse, they underestimate the abilities of database professionals and decide there is no need for them.”

Reeves emphasized the need to automate security and system standards so that the potential for human error is eliminated from the process. “This is especially important for companies that handle personally identifiable information (PII), or any type of sensitive data,” he said. “The bottom line is: Do not put it on the Internet if you have not automated every aspect of the system.”

No easy fix

As simple as this sounds, automation isn’t easy.

IT’s project priorities often outpace infrastructure improvements in corporate visibility. Consequently, critical projects like ensuring a strong disaster recovery plan or bolstering enterprise security with robust standards and automation get moved toward the bottom of the list—until a major system failure or security breach exposes the company.

“Just like we vigorously test automobiles and medical equipment, we should have rigorous standards and compliance enforcement with new technology. It’s simply negligent to apply new technology to a system without making certain sensitive data is not exposed,” said Reeves.

However, with the growth of citizen development and user-controlled IT operations in companies, improving security processes should not be at the bottom of any project list. Instead, CIOs must advocate for more robust IT security by creating awareness of risk management for the CEO, the board, and other C-level executives.

Five recommendations

How can CIOs avoid these potentially career-threatening circumstances? Below are five recommendations on how to ensure that new technologies and systems are properly secured.

1. Mandate corporate security standards are applied to any new technology before deployment.

This step is absolutely necessary, as more IT control is placed in the hands of end users eager to deploy as quickly as possible.

2. Secure C-level and board support for universal application of security standards

IT can’t enforce universal security standards without board-level, CEO-level, and C-level buy-in. If commitment appears lukewarm, end users controlling the systems will work around guidelines and security vulnerabilities will still exist. The same goes for IT. If IT staff only half-heartedly enforces security standards, it may cut code and install systems—leaving security conformance behind if there are deadlines to meet.

3. Automate security process whenever possible

The more you can automate security processes and checkpoints to ensure robust security, the more you can eliminate human error.

4. Continuously improve security as threats change

Hackers know their trade, so they are continuously inventing new ways to hack and penetrate networks. Your security risk assessments and methods also need to adjust as needed.

5. Link IT security management with the organization’s overall risk management assessments

IT security needs to rank as high as market and financial risk assessments. This way security’s importance will obtain better visibility in the eyes of CEOs, the board and C-level executives.

[“source=techrepublic”]

5 New properly Secure technology to Ways 2019-03-19
Tags 5 New properly Secure technology to Ways
Facebook Twitter Stumble linkedin Pinterest More

Authors

Posted by : Loknath Das
Previous Article :

Have We Mastered Technology, or Has It Mastered Us?

Next Article :

How yoga may enhance heart health

Related Articles

When and Why a Software Quality Assurance Assessment Is Necessary

admin 14 Mar 2026
The Role of AI in EdTech: 7 Major Use Cases Shaping Education in 2026

The Role of AI in EdTech: 7 Major Use Cases Shaping Education in 2026

admin 07 Mar 2026
How Real Estate Developers Use Dynamics 365 Business Central to Manage Multi-Project Finances

How Real Estate Developers Use Dynamics 365 Business Central to Manage Multi-Project Finances

admin 06 Mar 2026

Latest Post

The Ultimate Guide to Hiring an Interior Designer for Your Home
Home Deco

The Ultimate Guide to Hiring an Interior Designer for Your Home

admin 17 Mar 2026
Travel Health Guide: How to Prevent and Manage Altitude Sickness
Health

Travel Health Guide: How to Prevent and Manage Altitude Sickness

admin 16 Mar 2026

When and Why a Software Quality Assurance Assessment Is Necessary

admin 14 Mar 2026

Three Simple Changes That Can Boost Productivity in Virtual Teams

admin 13 Mar 2026
C-Section vs Normal Delivery: Key Differences Every Expectant Mother Should Know
Health

C-Section vs Normal Delivery: Key Differences Every Expectant Mother Should Know

admin 11 Mar 2026

Turning Education Ambitions into Action: The Delivery Toolkit

admin 11 Mar 2026
Successful L5–S1 Laminectomy and Discectomy for Intervertebral Disc Prolapse in a 38-Year-Old Female
Health

Successful L5–S1 Laminectomy and Discectomy for Intervertebral Disc Prolapse in a 38-Year-Old Female

admin 10 Mar 2026
March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    
  • Home
  • Contact Us!
  • Privacy Policy
Copyright 2016, All Rights Reserved
Magazine Blog News WordPress Theme