<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=522217871302542&amp;ev=PageView&amp;noscript=1">

Security Practice Foundations Series: Data and Application Security

Posted by Divya Prabakaran on Dec 27, 2018 3:00:00 PM

With security threats becoming more advanced, security and information management must become a top priority. Education and awareness are essential whether its best practices, security trends, or developing a foundational knowledge of security technologies. Our Security Practice Foundations Series blogs can help build a strong foundation in security knowledge.

What Are Data and Application Security?

blogA

Data and application security go hand-in-hand. Data security is the science of protecting information from theft or corruption (regardless of location). This is achieved through the implementation of technology(s) or by establishing and applying standards and protocols. The rise of General Data Protection Regulations (GDPR) and the growing acceptance of Bring-Your-Own-Device (BYOD) environments, has elevated the need for data protection. Data breaches can result in significant fines, as well as damage an organization’s reputation.

Application security refers to the measures taken throughout the application’s code life-cycle to prevent gaps in the security policy of an application or underlying system. Unfortunately, security has long been an afterthought; something that could be added on the back end to keep everything safe. But with security breaches seemingly becoming daily occurrences, the impetus has shifted to building in security measures up front in an attempt to mitigate and minimize the likelihood that unauthorized code could be used to manipulate applications to access, steal, modify, or delete sensitive data.[1 App Sec Link ]

blogB

blogC

Tools and Solutions to Help

Here are a few things you can do when it comes to securing the data of your organization:

  • Encryption: Data encryption adds a layer of protection and not only helps protect information in case it’s stolen, but it also helps with authentication to make sure something’s coming from where it says it’s coming from.
  • Data Erasure: Have policies in place for erasing data. For example, determine when data is no longer active or being used and can be removed from the system.
  • Data Resilience: Make sure to periodically backup your data. That way it can be recovered in the event of a breach or if it gets corrupted.

For more information on assessing your network and developing a stronger security practices, contact Tech Data’s Security Solutions specialists at securityservices@techdata.com. In the meantime, watch for our final two Security Practice Foundations Series posts on “Endpoint Security” and “Compliance.” If you missed any of prior blog posts in the series, you can catch up through the following links: Identity and Access Management, Security Intelligence, and Network and Perimeter Security.

Sources:

  1. https://www.gartner.com/it-glossary/identity-and-access-management-iam/
  2. https://insights.sei.cmu.edu/insider-threat/2018/01/2017-us-state-of-cybercrime-highlights.html
  3. https://eugdpr.org/ 
  4. https://www.darkreading.com/endpoint/12-trends-shaping-identity-management-/d/d-id/1331617
  5. https://securityintelligence.com/case-iam-three-reasons-develop-iam-authentication-practices/
  6. https://biztechmagazine.com/article/2016/09/3-reasons-deploy-identity-and-access-management-solution

About the Author

Divya Prabakaran is an intern with Tech Data’s Security team. She currently is pursuing a bachelor’s degree in Cybersecurity at the University of South Florida. When she’s not writing security blogs or doing schoolwork, she can be found in her kitchen baking and taste testing her new recipes.

Tags: security, data security, Cybersecurity, application security

Subscribe to Email Updates