Page 9 - index
P. 9
RESEARCH, ANALYSIS & TRENDS










































Important IT security factors for

compliance requirements




In today’s highly connected world, Users still use weak and unsafe tion is safer. Besides, limited per-
security and privacy are paramount, passwords. missions are usually sufficient for
and security-conscious organiza- the administrative day-to-day busi-
tions depend on solutions to keep In addition, many use multiple ness.
their data safe and their information passwords and in order not to for-
private. get them, write them down and in Beware of giving one person all
the worst case even put the piece permissions
Without doubt, the need for protec- of paper with the passwords in their Administrators usually have all kind
tion is growing, with passwords and desk drawer. It is better to ensure of permissions, and if more than
access restrictions that are unfortu- that an identity unification takes one has the rights, they often share
nately often not safe, although the place and that the users can self- the user account. In such a case,
laws require the highest level of administer their passwords, be- however, a two-factor authentication
security when it comes to data pro- cause then they do not have to is safer. Besides, limited permis-
tection. Not to mention, that there write them down in the first place. sions are usually sufficient for the
are compliance requirements for all administrative day-to-day business.
areas where computers are used. In Authentication in several steps
fact, the safety requirements for and encrypted Safe handling of personal data by
data storage and forwarding are To gain access to data often takes segregation of duties
becoming more stringent and more more than just a password. There- In a hospital, for instance, the ac-
and more demanding to fulfil. fore, a multi-factor authentication is counts department is not allowed to
recommended, as well as encrypt- have access to the sensitive medi-
However, in order to protect busi- ed transmission of passwords only. cal data of patients, and the medical
nesses and consumers, and to and nursing personnel on the other
know in an emergency that the law Beware of orphaned user ac- hand should not have insight into
is on your side, you should – espe- counts the bills of patients. The same way
cially as a small business - observe Administrators usually have all kind as the tasks are clearly separated in
and implement at least a few basic of permissions, and if more than this case, corresponding data has to
rules. one has the rights, they often share be separated and protected against
the user account. In such a case, prying eyes by im-
Self-manage passwords however, a two-factor authentica- plementing tech-

ePublisher for Asia
MediaBUZZ Pte Ltd - Independant MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   4   5   6   7   8   9   10   11   12   13   14