Verizon Team suggested remedies to prevent most of the security breaches
The Verizon Risk team in their annual report of the security of data throughout continental US found out more than 174 million exposed information records. These leakage included credit card numbers, electronic mail addresses, passwords, etc.
The Verizon has confirmed that more than 97% of the security breaches were generated with the aid of some external source & there weren’t any involvement of anyone from the company houses. They have confirmed that the looseness in the system & confusion in handling has lead many servers to fall under attack from the third party most of the times. Accordingly they have claimed that nearly 97 % of those breaches could have been stopped or prevented applying few simple measures. These measures would include the following:
One of the remedies can be the installation of a dependable firewall on the remote system. This could detect any intrusion attempt & according on such threat detection will shut off any access to other users except the trusted personnel. Other remedy to the crisis would be changing the previously configured security credentials on any router based system. It will signal any unauthorized access which was not previously detected due to the alignment of the security setting.
Verizon Wireless Network with their Risk team has been continuously trying to recover the security actions where breach is susceptible. In their research recently they have found that most of the companies under such breach issues usually outsourced their IT & other networking tasks without any confirmation about the security standards of those projects. Also many contractors provide their clients with authority of switching passwords from the previously optimized settings. The remedy list would also include elimination of unimportant data which are not necessary for the normal working program. The modern credit card system does not require the merchants to provide or store their entire information on the servers. Verizon’s research team however found out that some of the vendors kept copies of the credit card number excluding the security standards from their system or a case of non abidance was found.
Other remedies suggested would include the establishment & control checking. Inclusion of policies that would restrict the password sharing data sharing can be helpful to serve the purpose of prevention of information being leaked to the threat agents. Also the broken equipments should be at once replaced. All these remedies if taken care productively could help a user or firm protect the personal information.