123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Marketing >> View Article

What To Do With An Online Security Breach Part 2

Profile Picture
By Author: Mel Joelle
Total Articles: 4328
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Here is an example of a system that has too many fail points.

Company Widget Maker has a main database system that houses all of the company's leads. Company Widget Maker also has 400 additional branch offices that have access to the system; each branch has about 10 employees. Each branch also has separate branch websites that connect directly to the main database system.

In the above scenario there are over 4,000 users that can access the database system at the same time. Human beings like doing things easy, so most likely they don't have secure passwords, and they write down the password on plain sticky note in plain sight. The first and biggest fail points are all the employees. The second is the websites. They all access the same database system without a separate filter; a web-service is needed to filter out unwanted commands. Since they are all directly connecting to the main database, the database passwords have to be stored on each of the branches' database systems. That is an additional 400 fail points as well.

My advice in this particular situation is to create a web-service filter on the main ...
... database that only takes in information for known sources, and when the correct key or password is sent over. Having the key change at random intervals will minimize the window of opportunity a cracker has to get into your system since the keys change. Next time, make sure the servers at each branch that are talking to the main database are tightly secured, using strong usernames and passwords that are frequently so that no unauthorized personnel can ever get to them.

Next, require the entire staff to create a non-dictionary password that is reset every 30 to 60 days to minimize the risk in case a cracker does gain access to a password to the database. Making it mandatory to have the users' email account passwords also reset after 30 to 60 adds additional barriers of security. In the case that a cracker gets into an email account and sits and reads all the emails without a user ever knowing it, the system resets the passwords after a time period locking the cracker out.

All systems are only as strong as their weakest point and in today's technologically advanced world, the weakest point is still human error. By using the method of having random changing interval keys being passed between the database systems, it creates an additional level of security on the machine side. Doing the same for the human side will greatly reduce the risk of a security breach.

I also cannot stress this enough; make sure you keep up with all security patches for all the software you are running. This is a huge job to do in itself. This is usually the responsibility of the network administrator, so having a competent one on staff is a must.
Click here to read the rest of Online Security Breach. If you enjoyed this article, you also might like our other stories about Search Engine Optimization.

Total Views: 310Word Count: 505See All articles From Author

Add Comment

Marketing Articles

1. Marketing Services Brisbane
Author: triffid

2. 10 Benefits Of Customized Erp Software Over Generic Solutions
Author: Elite Mindz

3. Top 10 Cross-platform Mobile App Development Tools For 2025 Success
Author: Stifen Lucas

4. How To Boost App Downloads: Insider Tips From Uk App Store Optimisation Pros
Author: Tony Andrews

5. The Best Free Crm With Email Marketing
Author: Lee Wood

6. Cadbury Real Magic Ad Review: A New Standard In Emotional Advertising
Author: Marketing Godfather

7. Best Digital Marketing Agency In India Grow Your Brand With Dtroffle
Author: Dtroffle

8. Should I Give Her My Initials? Understanding The Gift’s Meaning
Author: Argent asher

9. Financial Media Networks: Unlocking The Next Wave Of Digital Marketing
Author: Marketing Godfather

10. Electric Orange Juicer Machine – Wireless Citrus Press Juicer For Fresh Mosambi Juice
Author: Chestore

11. Revolutionize Your Meal Prep With Our Versatile 4-in-1 Electric Vegetable Cutter Slicer Grater Chopper. This Compact, Multifunctional Kitchen Gadget T
Author: Chestore

12. G-shape Led Wireless Charging Speaker Lamp – 4-in-1 Bluetooth Speaker
Author: Chestore

13. Why Choose A Software Development Company In Delhi For Your Business Growth
Author: Kliff Technologies

14. Ai Automation Agency Vs. In-house Teams: Which Delivers Faster Growth For Scaling B2b Companies
Author: Product Siddha

15. How To Heating Elements Work
Author: Space Enterprises India

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: