What do you need to know about security threats for SQL Server?

Today, organizations are about data. Database systems and the elements they store are arguably the most valuable assets in any given enterprise. Not only are executives and IT leaders responsible for doing what is right to protect the best interest of the organization, they are obligated to comply with the seemingly endless list of industry and government-imposed regulations.

As we have seen for more than a decade, database-related security breaches cannot be taken lightly. One of the greatest threats to databases is insiders with ill intent. Computer networks have become so complex that it’s easy for database administrators and IT managers to overlook database security gaps that are easily exploited without anyone ever knowing about it. Security weaknesses that would’ve been considered obvious and relatively simple to fix not that long ago are now the Achilles heel of modern organizations.

These challenges have created an environment where not only can a lot go wrong but there is also so much to lose. This is especially true when you do not have the proper culture combined with the proper organizational and technical controls/tools to ensure database security and compliance are kept in check. All it takes is one oversight, misstep or bad choice by a malicious insider and you have got a database security breach on your hands that you and your executives may not be prepared to take on.

Read the 13-page whitepaper “The SQL Server Security Threat - It's Closer Than You Think to learn what your organization is up against, the database administrator’s role in compliance, understanding the database security threat, what you can do to minimize database risks, whether to comply or not comply, how to move forward, regulations impacting database security, and common SQL Server security questions.

Click here to download the PDF file.

The presenter, Kevin Beaver, is an independent information security consultant, writer, professional speaker, and expert witness with Atlanta-based Principle Logic, LLC. With over 28 years of experience in the industry, Kevin specializes in performing independent security assessments to help his clients uncheck the boxes that keep creating a false sense of security. He has authored or co-authored 12 books on information security including the best-selling Hacking For Dummies and The Practical Guide to HIPAA Privacy and Security Compliance. In addition, he is the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached through his website at www.principlelogic.com and you can follow him on Twitter at @kevinbeaver.

Anonymous