Tagged: two factor authentication

0

Could your cloud be deleted?

Are a username and password all that stand between you and total loss? Is your organisation’s IT health solely dependent on another company’s financial health? As part of deciding to embrace cloud services, you must be able to identify a new set of risks to business continuity that perhaps weren’t a concern previously. Here’s just two… Bankruptcy  You’ve decided to outsource your application to a SaaS (Software as a Service) or other public cloud provider.  In large scale SaaS contracts, considerable attention is rightly placed on Service Level Agreements (SLAs) to ensure the availability of the application to the business.  But what happens when an SLA can’t protect you? Have you considered  how your business may continue to function if your cloud service was withdrawn without notice,...

2

Database encryption – is it worthwhile?

The Wall Street Journal recently reported giant US-based health insurer Anthem had suffered a massive breach of its sensitive customer database. It is thought the entire contents of the database was successfully retrieved by the intruders, who had obtained a legitimate employee’s credentials. The Journal cited a source familiar with the breach, who said the sensitive database was not encrypted and that encryption would have made it more difficult for the intruders to obtain the information. This gives rise to an important security architecture question: when should you encrypt a database? What are the benefits? Would database encryption help? We have very few public details to work off, but in this case I believe database encryption would not have altered the outcome. The intruder had obtained a legitimate employee’s...