Top 10 Data Availability and Security

Next up, as our Best of 2019 series moves along, we have our Top 10 Data Availability and Data Security. So far we covered the best of Data Integration and Data Quality.

Availability

Read on for the top ten Data Availability and Security posts.

#10 Why Data Encryption is Critical to FinTech?

FinTech (financial technologies) is transforming the financial services industry. FinTech professionals from banks and credit unions to insurance companies deal with huge amounts of private data on a daily basis – and the best way to keep it secure is with encryption. Not only are companies deploying encryption as a security best practice, but it is also needed to meet compliance with regulations like PCI DSS.

#9 Best Practices for IBM i Security

I like to begin any security best practices discussion with a question. Does your company have the deep knowledge required to properly secure your network, all your servers and your portable or mobile devices? Securing your IT environment is a daunting task for companies of any size. Deep security skills that span many different technologies are required to adequately configure and maintain the many technologies that exist to support an IT installation.

#8 How to Maintain Data Availability

How many times do you access your data on a daily basis? It could be just a few or 100 times a day, but in either case, you depend on that data for almost every decision you make. So imagine what would happen if that data became unavailable for any reason. Ensuring that all data is available at all times needs to be a mission-critical priority for every enterprise. Follows these tips to keep your most important resource online and accessible.

Related:- 11 Gadgets That Just Might Save Your Life One Day

#7 NYDFS Cybersecurity Regulations and Encryption – 7 Steps to Compliance

On March 1, 2017, the New York Department of Financial Services (NYDFS) made their cybersecurity regulations for the financial services industry effective and provided covered entities with 180 days to achieve compliance. The financial sector includes banks, insurance companies, consumer lenders and money transmitters. The law − formally known as 23 NYCRR 500 − takes a very prescriptive approach to cybersecurity which includes a mandate to encrypt data at rest.

#6 New Assure MIMIX for Db2 Mirror Is an Essential Complement to IBM i Db2 Mirror

On April 23, IBM announced the 7.4 release of the IBM i operating system. Among the many advances in the operating system is the new Db2 Mirror feature. This exciting new capability synchronously replicates data in an active-active mode between Db2 nodes in the same data center. This ensures continuous Db2 data availability by preventing downtime due to planned maintenance or database node failure.

#5 Anonymization vs. Tokenization: Exploring Use Cases and Benefits

How do you protect sensitive data when you need to use it and put it to work? Privacy regulations place strict controls on how personal information can be accessed and shared. But you also can’t let your business grind to a halt. Two technologies that can help are tokenization and anonymization. While they’re both designed to protect sensitive information from prying eyes, they work differently and meet different requirements.

#4 The State of IT Security for 2019: Results from our Survey

In 2018 alone, multiple security regulations became effective across the globe, most notably the European Union’s General Data Protection Regulation (GDPR), and additional regulations are on their heels. As a result, businesses already grappling with increasingly sophisticated cybersecurity attacks now must contend with additional regulatory requirements. To check the pulse of IT teams managing security, Syncsort surveyed over 300 IT professionals on the state of security in their organization, more than a third of whom had firsthand knowledge of security for IBM i systems.

#3 System Logging on the IBM i (as400): An Introduction

As a company that works hard to protect your data, we get a lot of questions.  One topic that we frequently get asked about is system logging on the IBM i. System logging on the IBM i is different from logging on other platforms. In an interview with Patrick Townsend, Founder & CEO of Townsend Security, he reviewed what system logging is, and why it is unique for IBM i systems. Below is an excerpt from that conversation.

Related:- 8 Mobile Videography Tips for Beginners

#2 PGP vs. RSA: How Are They Different?

With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. There is also increased confusion about the different types of encryption available. Some are more appropriate for internal purposes, such as with large databases. Others may be more effective when you need data migration to an external vendor or other sources.

#1 AES vs. RSA Encryption: What Are the Differences?

One thing that’s become abundantly clear in the internet age is that preventing unauthorized people from gaining access to the data stored in web-enabled computer systems is extremely difficult. All it takes is for a worker to click on the wrong link in an email, or respond unwarily to a seemingly legitimate request for information, and an intruder could gain complete access to all your data. In today’s regulatory and public relations environments, that kind of breach can be catastrophic. But what if you could be assured that even if an attacker got access to your information, they couldn’t use it? That’s the role of data encryption.