Wednesday Feb 05, 2014
Recent retail data breaches serve as a sobering reminder that the retail industry continues to be a key target of cybercriminals in 2014.
In fact, according to the recent Verizon Data Breach Investigations Report, nearly a quarter of all data breaches occurred in retail environments and restaurants.
The Verizon report demonstrates that there exists a relationship between industry, attack motive, and threat actor. Payment card data is often stolen from retailers by organized criminals from many different geographies. They are going for volume and so should you. Protect your biggest targeted assets first – your databases.
Common attacks leverage legitimate user credentials to access sensitive databases and steal sensitive payment card data. Implement controls around what users have access to and enforce least privilege, especially in consolidated environments. Also, audit database activity to detect and stop unauthorized activity as well as collect critical forensic data that might be needed.
Despite following PCI DSS requirements, data breaches are a constant reminder that compliance is not enough to thwart a motivated attacker. Assess your existing controls to identify your company-specific vulnerabilities that put your organization's data at risk.
Oracle suggests retailers adopt a defense-in-depth approach to protect sensitive data from the inside out and future-proof against evolving regulatory requirements such as the new Payment Card Industry Data Security Standards.
To learn more about Oracle’s Security Inside Out approach and assess your data security posture for potentially disastrous vulnerabilities in your environment, please contact your Oracle Security account team to setup a complementary consultation.
Who are we?
Follow us on
- Oracle Database 12c Real Application Security Administration Application - Now Available on OTN
- Security Inside Out Newsletter, May Edition
- Securing the Big Data Life Cycle: A New MIT Technology Review and Oracle Paper
- Using Earthquakes to Predict Cybercrime
- 86% of Data Breaches Miss Detection, How Do You Beat The Odds?
- Three Big Data Threat Vectors
- Security and Governance Will Increase Big Data Innovation in 2015
- Securing Information in the New Digital Economy
- Top Two Cloud Security Concerns: Data Breaches and Data Loss
- All Data is Not Equal, Map Security Controls to the Value of Data