Establishing governance and definitions of data involves a few integral pillars. But what are the best ways to structure those data stewardship roles for your business? Check out five, must-do jobs of today’s data stewards, according to the report “Building Data Stewardship is a New Customer Intelligence Imperative” by Forrester Research
Tag: Data Breach
Beyond Quality and Security – The Importance of Establishing Control Points for Information Management across the Organization
Strong data management doesn’t just begin on the back end, when the data actually hits a database. It begins long before that, early in the data lifecycle, and across many areas of the organization. Check out the guest column by Micheline Casey where she highlights the importance of establishing data
Solix Technologies, Inc. Announces Data Masking and Data Validation Downloads for SQL Server
Safeguards against Data Security Breaches (Part One)
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to hacking, malware and other potential risks. Concerns about security, trust and PII, personally-identifiable information, are all taking center stage
New Research Reveals: Consumers Crying out for Better Personal Data Security in Call Centres
Do you know six million consumers end relationship with organizations each year due to call centre security concerns? Do you know multiple security passwords are more of a pain to consumers? Banks top the list of organisations consumers trust least with their personal data, according to a survey conducted by Avaya,
How ConAgra Foods effectively minimized the chance of data breach
15 worst data breaches
Though most organizations are aware of the fact that a data security could cost them dearly, security breaches happen regularly. But what constitutes a huge breach versus a small one? To get some perspective, let’s take a look at 15 of the biggest incidents in recent memory. More>>
Considerations for Using Tokenization to Mask Your Sensitive Data
When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high