<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; big data</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/big-data/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Big data can mean big breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/#comments</comments>
		<pubDate>Tue, 27 Mar 2012 08:20:33 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1042</guid>
		<description><![CDATA[As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F27%2Fbig-data-can-mean-big-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=big+data,breach+prevention,Business+identity+theft,Data+Breach,Data+Security,PHI,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/big-data1.jpg"><img class="size-full wp-image-1051 alignnone" title="big-data" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/big-data1.jpg" alt="" width="491" height="369" /></a></p>
<p>As companies accumulate vast amount of data to improve their business intelligence, the risks of <a title="Consequences following a data breach" href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/" target="_blank">data breaches </a>accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data can be personal, sensitive and subject to regulation.  A recent Forrester report highlights the escalating security threats of this sort of “big data processing,” meaning the tools and techniques that handle extreme data volumes and formats.</p>
<p style="text-align: left;">The report underscores the importance of identifying the “toxic data” within these big data stores &#8211; in other words, the kind of data that will spell big trouble if it slips from an organization’s control.  This includes credit card numbers, <a title="Ensuring the security of personal identifiable information " href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personally identifiable information </a>(PII) like Social Security Numbers, and <a title="Help your customers protect their PHI" href="http://www.experian.com/blogs/data-breach/2010/09/21/help-your-customers-protect-their-phi/" target="_blank">personal health information</a> (PHI) — and sensitive intellectual property, including business plans and product designs.  This is, of course, exactly the type of data that hackers and fraudsters are eager to steal.  Further, big data can include information that companies control but don’t own, such as customer and business partner data.  Big data can make a thief’s job easier by concentrating disparate toxic data in one place.</p>
<p style="text-align: left;">Forrester suggests a framework to help security and risk professionals control big data:</p>
<p style="text-align: left;">1) <em>Define the data</em></p>
<p style="text-align: left;">Data discovery locates and indexes big data, while data classification catalogs data to make it easier to control. Classify data based on toxicity, which will determine where it is stored.  Implement strong policies regarding data handling, storage, and records management, which will preclude the storage of sensitive information on laptops and mobile devices.  Security professionals must continuously discover and classify data as users create it throughout the organization’s network.</p>
<p style="text-align: left;">2) <em>Dissect and analyze the data</em></p>
<p style="text-align: left;">Experts can extract important data from big data sets that will help protect corporate assets; in other words, big data can be used to protect big data.  Analyzing this information is helpful in understanding how to protect big data.</p>
<p style="text-align: left;">3) <em>Defend and Protect the data.</em></p>
<p style="text-align: left;">Limit access to all resources, strictly controlling the number of people that can access data and continuously monitoring those users’ access levels throughout their employment. ·Inspect data usage patterns so that you can detect potential abuses.  Dispose of data when it’s no longer needed, and “kill” data  &#8211; using data abstraction techniques such as <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">encryption</a>, tokenization, and masking &#8211; to devalue it for use on the <a title="8 insights to the underground fraud economy" href="http://www.experian.com/blogs/data-breach/2011/05/24/8-insights-into-the-underground-fraud-economy/" target="_blank">underground market</a>.</p>
<p style="text-align: left;"> <div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Cyber Insurance and Your Data Breach Response Plan" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_032712_article ">Breach Weary? Download this free white paper and learn how cyber insurance can help reduce your risk</a>.</div></div></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/&via=Experian_DBR&text=Big data can mean big breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F27%2Fbig-data-can-mean-big-breaches%2F&amp;title=Big%20data%20can%20mean%20big%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/27/big-data-can-mean-big-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>