How would you handle or respond to a project situation in wh
How would you handle or respond to a project situation in which you were working on a system and before going live and replacing the current system you run tests with live data and live connections to outside network links or portals, only to find that you are compromised by a hacker that gained access to your clients PII or Personally Identifiable Information?
Solution
An effort to shift responsibility for a project at data breach at a community, Casualty and Surety of filed suit against the project web designer, claiming its negligence and “substandard” maintenance of a website set the stage for a breach. As an agency, you can and should reduce your risk by implementing proper security for your clients, even if it means taking money out of your bottom line.
As many agencies that we interact with can attest, adding security as a line-item when responding to RFPs helped them win bids. It not only ensured their prospective clients that security was top of mind, but also instilled confidence in the competency of their agency. the importance of key management is now resonating with the general public . The company is in the process of handing iCloud encryption keys to account holders so that no matter how many government subpoenas it receives , has no way to decrypt user data. With (potential) clients hearing these stories, security becomes an easier sell.
When you share the same server as an unsecure site, it can bring you down when it is inevitably hacked. When choosing a hosting provider, ask about their infrastructure, security, and how they have dealt with security problems in the past. It is also important to note, hosting providers can say they are compliant with regulations like PCI DSS, etc, but it doesn\'t mean that you are PCI compliant and have nothing to worry about. Your hosting provider’s certifications apply to them.
