DATA SECURITY PROPOSAL
Strategies to mitigate data breaches from cyber attackers
Executive summary
Cybercrimes have been on the increase with one of the most common crime being data
breaches that have faced many companies leading to loss of millions of money. However one of
the main questions that any company should seek to answer is, how do cyber attackers get hold
of information and is there a way in which data breaches can be avoided and prevented? The
surprising answer is yes, any company that seeks to maintain confidentiality of their transactions
needs to come up with strategies that will put them ahead of the cyber attackers by having
systems that can detect any unusual activities within their network system. One of the main
sources of data breaches is poor management of the third vendor systems that are responsible for
approving credentials. Any company that seeks to stand strong to cyber-attacks needs to be
aware that prevention is vital, however detecting any attempts of data breaches early enough is
key. This proposal is aimed at giving an ideal solution to the problem.
The paper proposes some of the strategies that have worked for other companies however
the strategies will be flexible in that they will incorporate the unique characteristics of the
company. Key performance indicators of whether the system is actually working will also be
suggested. The proposal also seeks to identify some of the important data that need to be
collected in formulating effective strategies that will actually work. It will also address the type
architecture the will be used in an attempt to track how information flows from the user s to the
point where it is approved for any transaction to proceed. Finally the proposal will consider
whether it is more optimal to outsource the security system or to build it within the company’s IT
department.