First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

Kevin Duggan

Protecting sensitive data against the insider threat with data masking

With an overabundance of information being stored or created in electronic format, and various tools for turning data (i.e., personally identifiable information, intellectual property, credit card) into cash, goods, and other services, the risks of doing business have increased. We are hearing more and more about attacks where the target is sensitive data, and the perpetrators are those with elevated levels of trust and access within the business.

 

, , , , , , , , , , , , , , , , , , , , , , ,