Security and compliance are two sides of the same coin, although they are often seen as adversaries. The truth is, much like the 1980s power siblings, the Wonder Twins (whose powers only functioned when their fingers touched), they work hand-in-hand to shore up your information security better than any other combination.
Compliance is Key
Regulatory compliance is instantiated as a gateway to security through following relevant protocols. In particular, if you conduct credit card transactions of a certain volume, then PCI DSS helps let other vendors and customers know how secure their interactions with you are.
HIPAA, somewhat similarly, protects sensitive patient data (when the healthcare industry is involved) and network, physical and process security when other industries are concerned.
The point is, compliance lets businesses know that you take security seriously, which grows the confidence that business partners and consumers have in your services. The reliability conferred is similar to creditworthiness; it’s a measure of the responsibility you take in your infrastructure and business practices.
Security: One Half of Your Superpower
Much like our previously mentioned Wonder Twins, focusing on security alone, although certainly worthwhile, can never get you to your full potential.
Security, in particular, concerns the protection of your database, network and hardware. You can use a triumvirate of firewalls, encryption options and passwords for access control. Not only can attempts be malicious, but they can also result from employee negligence – as such, human error must also be minimized.
Compliance as the Other Half of Your Superpower
Once you’ve heralded the importance and implementation of detection, prevention and the terms of your response to cyber-threats, you need compliance to help bring up the rear.
Depending on the type of business you run, compliance can come in the form of COBIT, the fore-mentioned PCI DSS, ISO, (Read more...)
This is a Security Bloggers Network syndicated blog post authored by Tripwire Guest Authors. Read the original post at: The State of Security