IT

5 Ways to Improve Database Security


You don’t have to go far to find out how important database security is. For instance, Target is still reeling from their systems being hacked, exposing the credit card information of many of their customers. It’s the kind of harm that requires a lot of time, money, and resources for damage control, as well as the aftermath of breaking the trust in the company and diverting resources toward making sure it doesn’t happen again.

Ensuring the security of your company’s information is important, and even some of the biggest businesses can expose themselves to hackers exploiting security flaws. The information in your company’s databases are important, so it stands to reason that database security is too.

Here are five things you can do to keep your company and customer information safe and secure.

1. Have secure passwords.

The most sophisticated systems on Earth can’t protect against a bad password. There are the typical culprits — 12345, ABCDE, anything else on the most guessed password list — but hackers have increasingly sophisticated tools at their disposal that makes many other passwords increasingly vulnerable. Now, it’s not just making your password “password” that you have to worry about. It can be words in-and-of themselves. Programs exist that guess passwords that might be words in the dictionary or commonly used phrases, so those are out.

You can try to make a combination of letters, numbers and symbols to throw off would-be hackers. You can check your password here to see how long it would take hackers to guess it. Business Bee has also rated some password management tools that may be able to help you.

One other suggestion is to set rules that make employees change passwords on a revolving basis. If a password isn’t changed after 90 days, lock out that account pending administrator approval to make sure that an old password isn’t a hacker’s way in.

2. Encrypt your database.

Just as important as the passwords is the encryption of your database. Encryption means converting your data to a format such that, were it to be intercepted, would seem like a string of letters and numbers with no tangible meaning. But to the database program, it all easily converts to the data you want. But it ties back into passwords. A Yahoo! hack in 2012 exposed more than 400,000 passwords in plain text to the web at large. This meant open access to emails and passwords, and the need for a whole lot of users who put their faith in Yahoo! to change their passwords. Here, too, you don’t want to be the company at the other end of that controversy. Make sure that your database is encrypted with up-to-date encryption software.

3. Don’t show people the backdoor.

A simple way to protect your database? Leave it out of sight. This means keeping it hidden from search engine results through the robots.txt file, and also not linking to it directly. While you want employees to have access to database information, you may not want to put the log-in directly on the site. If you have an online database, do yourself a favor and keep it on a need-to-know basis. After all, the first step toward hacking a database is finding it in the first place.

4. Segment your database.

A wide open database is a wide open vulnerability. You’ll want to segment your data to make sure that not just anyone sees everything. In many systems, various roles can be created within the database.

For instance, you might want to have users, super users, administrators, and super administrators. Users can access or input basic information, but not alter information beyond what they’ve put in, whereas a superuser has computer permissions that allow wider access to data without being able to change everything. An administrator can work above all of these users, altering the structure of the database or having access to more sensitive information, while a super administrator can run the whole operation. For the upper tiers, you’ll want to keep the number of people with those clearances low, such as managers or department heads. This ensure that, should a password be exposed on the site, it’s not devastating if it’s only someone with access to basic information on the site.

5. Monitor and audit your database.

One way to prevent database breaches is to keep an eye on the database itself. Monitoring access and behaviors of database users can help you ensure that no odd behaviors are exhibited that might imply a leak. Checking unfamiliar IP addresses can ensure that no one has an employee password who shouldn’t. Think of it like when you get a call from the bank asking you to confirm a transaction. Your address is in New York, but your card is being used in Calgary. It’s a red flag to bank security, and the same thing should be a red flag to your business.

In addition, regular audits of your database help find inactive accounts, helping eliminate problems that might arise with someone obtaining old employee information. Perform regular audits, and your company can tighten up security before problems arise.

  • Brandon James

    I had some nagging late payments, medical bills, student loan and a bankruptcy filed 2016. I had credit scores of 554 (TransUnion) and 548 (Equifax) in april 2018. I applied for a surgery loan in July but was not approved because of my poor credit profile. I contacted my loan officer, he explained that I needed a score of 740 and the bankruptcy removed from my report before I can be qualified for the loan. I had to seek for a way to raise my score and bring my credit profile up to speed because I had to do the surgery at that time. I made some research and I got a lot of good review and strong recommendations on CYBER WIPE an ethical hacker who has helped a lot of people in the States so I decided to email him (CYBERWIPE@TECHIE.COM). He replied my email and asked me to text him for further discussion, I did and he explained the process to me in a very simple terms. We got started with the process on a substantial agreement. After 2 weeks, he removed the bankruptcy, deleted other negative items, eventually raised my score to 782 and verified the changes with the 3 credit bureaus. I got the loan, went through with my surgery and I have CYBER WIPE to thank. If you need a similar help with your credit, Chexsystem and DUI report, you can contact him via email above.

  • Moore Clara

    You’re in total control over your credit score, no matter if it’s in the low 400’s or high 700’s. The cost of poor credit is massive. You will pay higher interest, require larger down payments, and ultimately life will cost you more than someone who has excellent credit. The game of credit scores never ends. You might have an 800 credit score one week and a 630 the next. That is why I keep my family hacker – CYBER WIPE close. He deletes any form of negative items (eviction, medical bills, bankruptcy, student loans, judgments, etc.) on reports and replaces them with good tradelines (mortgage tradeline, revolving credit cards, installment tradeline, auto tradeline, etc.) that will help boost your score more effectively, efficiently and less costly. He adds or removes any info on credit profiles, I guess he can hack the devil himself, LoL. He repairs credit in 7 business days and on the 8th day you can pull your report and confirm the good changes on your report. you just have to Contact him today and thank me later
    CYBERWIPE@TECHIE.COM

  • Taylor Anderson

    My friend is wanting to start up a business, but he wants to make sure it is secure physically and electronically. These tips will really help him do that. He also wants to outsource his IT needs, so do you have any tips for finding a secure IT company in his area?
    http://colitus.uk/security-consulting.html