Posts

3 Things Your Business Should Learn from the Home Depot Data Breach

HomeDepot Data Breach

Experts say it may be the biggest data breach in U.S. history involving consumer credit and debit cards, with customer data stolen from more than 2,000 stores across the U.S. Home Depot is currently investigating the possible breach, which is believed to have possibly affected more than 40 million payment cards. Last year’s Target breach, which made national headlines and had a negative impact on the company’s stock, impacted more than 70,000 payment cards.

The reports are bringing concerns from consumers, who aren’t sure if their own cards may be affected. But businesses of all sizes should be concerned, as well, because the September 2nd warning of “unusual activity” to Home Depot from its bank could happen to any business. Before it happens to your organization, here are three things you can learn from the news about Home Depot’s data breach.

Data Security Should Be Tightened

While no amount of security is impenetrable, a business can protect itself by employing the latest security on each server that holds customer data. For retailers and ecommerce sites that use payment processing service providers, it’s important to contract with respected providers who employ the latest security to keep your customer data safe.

Data Breaches are Expensive

When the dust settles down on the Home Depot scandal, the company will still face months of backlash from the negative publicity. Target is still feeling the aftereffects of its December 2013 data breach, having lost the trust of the public and its investors. For months after the security issue, some customers are hesitant to use a credit card while shopping at an affected store, even after a business assures customers things are once again secure. The damage to a brand’s reputation can be financially devastating, potentially even forcing smaller businesses to close.

Microchips are Essential

Even as the news about these data breaches emerges, financial institutions are issuing cards with microchips that help prevent fraud. Merchants must upgrade to new terminals to accept these new cards, but once installed, these microchips will interact to identify the card, protecting credit card data and reducing the risk of data theft.

If your small business deals in customer payment information, it’s important to take as many measures as possible to protect that information from a data breach. Breaches can be extremely costly, potentially dooming a business to failure, so the future of a company may rest on its data protection procedures.

Take This Checklist to Avoid Hollywood Hacking Scenario!

Leaking private photos of Hollywood’s top celebrities strikes the warning alarm of cloud security again. While arguing and discussions around cloud vulnerabilities never cool down, this time the Hollywood sensation is more a lesson about how to use cloud adequately rather than a “to use, or not to” debate, especially for business users.

Why? Simple, we are living in the cloud epoch and the world is just not heading back! So, what can we learn from the disaster this time?

First of all, use cloud attentively and carefully! Keep it in mind that you are on cloud, right now and almost for every second! No matter what you do, what devices you use and what’s the size of your business, hardly you do not use cloud – as a matter of fact, you may be part of the cloud already!

Well then, simple NO.1, DO NOT use simple, easy-to-hack-down passcode – something like a birthday, street number or phone number, or even combinations of them. Sounds easy and common sense? – Yet 70% business cloud users are not following this NO. 1, simple password policy!

Second, always consider additional security methods to further safeguard your data! Secondary encryption and two-factor authentication are among the top options.

“Secondary encryption” enables the account’s owner to take matters in his/her own hand to protect the data. Rather than relying on built-in encryption or SSL transfers that cloud providers have within their infrastructure, you can leverage other encryption programs such Box Cryptor or TrueCrypt. These programs essentially encrypt your files on the fly prior to storing it on the cloud so that your files remain unreadable even if a hacker manages to steal your password or breach your cloud provider’s normal defense mechanisms.

“Two-factor authentication” may sound jargony and unfamiliar, but it’s actually something you use all the time nowadays. Remember those requests asking for a four or six digits verification code in addition to your username and password, which are usually sent to you via text message? Those random generated, time sensitive codes are “two-factor authentication”. For business users, it can be a lot more varied and strengthened and it can be both virtual and physical, which enforces another powerful defense line for your data security.

Well, as short as this checklist is, it may save you from big trouble and loss! And if you want to learn more, check our IT Security blogs and fuel you up with more professional data-protection tips!

And share this Infographics with you IT management team:

data-security