Wednesday Feb 05, 2014
Recent retail data breaches serve as a sobering reminder that the retail industry continues to be a key target of cybercriminals in 2014.
In fact, according to the recent Verizon Data Breach Investigations Report, nearly a quarter of all data breaches occurred in retail environments and restaurants.
The Verizon report demonstrates that there exists a relationship between industry, attack motive, and threat actor. Payment card data is often stolen from retailers by organized criminals from many different geographies. They are going for volume and so should you. Protect your biggest targeted assets first – your databases.
Common attacks leverage legitimate user credentials to access sensitive databases and steal sensitive payment card data. Implement controls around what users have access to and enforce least privilege, especially in consolidated environments. Also, audit database activity to detect and stop unauthorized activity as well as collect critical forensic data that might be needed.
Despite following PCI DSS requirements, data breaches are a constant reminder that compliance is not enough to thwart a motivated attacker. Assess your existing controls to identify your company-specific vulnerabilities that put your organization's data at risk.
Oracle suggests retailers adopt a defense-in-depth approach to protect sensitive data from the inside out and future-proof against evolving regulatory requirements such as the new Payment Card Industry Data Security Standards.
To learn more about Oracle’s Security Inside Out approach and assess your data security posture for potentially disastrous vulnerabilities in your environment, please contact your Oracle Security account team to setup a complementary consultation.
Who are we?
Follow us on
- New Oracle Data Masking and Subsetting Blog
- Vote for Oracle Audit Vault and Database Firewall in Database Trends and Applications Reader's Choice Awards
- Protecting the Electric Grid in a Dangerous World
- Forrester Report: Total Economic Impact of Oracle Data Masking
- Countering Adversaries Webcast Series
- Oracle Open World 2014 Call for Proposals (Papers)
- Part 4: Controlling Data Access and Restricting Privileged Data in Oracle Database
- February Edition of Security Inside Out Newsletter, Now Available
- Bitcoin Exchange Files Bankruptcy in Wake of Cyber Attack
- Part 3: Controlling Data Access and Restricting Privileged Data in Oracle Database