BY Niall Rooney | 10 January 2019
With strict new cybersecurity laws like the established PCI DSS, GDPR in Europe, and the Australian data privacy legislation, organizations are being held to account for the steps they take to keep people’s data safe. While these standards are certainly positive steps forward for data security worldwide, they can pose several difficult and expensive challenges for businesses. However, data security is nothing new, and there are several methods available to organizations to help them to keep their data secure. Sensitive data masking is one such method and it is an extremely effective way of ensuring that sensitive data is kept safe by rendering it impossible to interpret.
Sensitive data is any information that is required to be protected because it holds value only when it is kept secret. For example, credit card data is sensitive data because it can be stolen and used by someone who does not own it, with negative consequences to the card’s actual owner. The stolen card data can be used by someone who does not own it to purchase goods and services.
Other forms of sensitive data include names, addresses, phone numbers, gender, religion and employee information. This type of data is extremely valuable to cybercriminals because it can be sold on the dark web in order for criminals to successfully assume fake identities. In many countries around the world, identity theft is a serious crime.
Organisations that store this sensitive data have a duty of care to keep this sensitive information secure because it has been entrusted to them by their customers. The aforementioned data privacy laws, like PCI DSS, set out a list of requirements to help organizations understand what they need to do in order to minimise the risk of sensitive data being lost.
Regulators have developed security standards like the PCI DSS in order to help protect and secure the payment card ecosystem. Understanding the requirements of PCI DSS will not only help your organization avoid hefty fines, but will ensure the safety of your customer’s sensitive data. These are the 12 requirements of the PCI DSS:
Ground Labs’ Enterprise Recon software can be used to scan for sensitive data in locations where the user would not expect to find it. The user can then remediate this information by performing sensitive data masking if it is a data type that supports masking such as a credit card number for example.
Enterprise Recon gives the user the power to take control of their data and take positive remediation action over the data they have stored in their network.
For example, credit card data is often stored by organizations in order to process transactions. This data is kept in a predetermined format such as the card number, name, CSV and expiration date. When masking this data by hashing out all but the first six last four digits of each credit card number, the data is secured by being rendered unreadable by unauthorised personnel. Masking is a destructive data remediation technique so it is important that you are aware that any masked data may be impossible to restore once it has been redacted.
Masking sensitive data can be an important part of many compliance requirements for standards such as GDPR, PCI DSS and HIPAA.
Sensitive data masking is an important step in achieving PCI compliance specifically. Data masking for credit card information is useful because it retains the format of the credit card information without revealing any usable sensitive data to hackers.
Ready to learn more about how to achieve PCI DSS compliance? Request a demo today.
Share this article!
Want to keep up with all our blog posts? Subscribe to our newsletter!
As companies all around the world continue have large portions of their workforce remote, the need to keep their data safe and protected is even more critical. To help companies navigate this new reality and mitigate security risks, we are providing a 90-day complimentary version of our flagship solution—Enterprise Recon. Learn more about it here.
Please submit the form below and we’ll contact you to schedule a discovery call. Want to skip the email? Go here to schedule a meeting directly on our calendar.