Thank you for your interest and continued support.
This is Takahashi from the Marketing Plan Research Laboratory.
Every few years, if that
we see reports of data breaches at major corporations.
(Whether it’s taking customer data and selling it to list brokers,
using it for sales at a new employer, or data leaks due to simple mistakes)
Especially when these stories are making headlines,
I’m often asked, “Is our company safe from data breaches?”
Even if a system doesn’t contain personal information,
it’s a major problem if product codes, lot numbers, or unit prices per client are leaked to the outside.
But to be honest,
“There’s no alternative but to manage your employees carefully.”
From the perspective of preventing data leaks, the only way a system can help is
・Login using a combination of individual IDs and passwords
・Recording system usage history chronologically for each individual ID
• Restricting the functions that can be accessed for each individual ID
・Restricting the items that can be viewed for each individual ID
・Restricting the source of system access (such as IP addresses)
These are the only measures in place,
and it is not possible to restrict the destination of output forms or data.
Furthermore, if restrictions on output are made too strict, the system loses its value.
This is because the system exists for output, not for input.
Convenience and risk are always a trade-off with the system.
Regarding information leaks, it is up to each user company to
we believe the time has come for each company to take measures
rather than the system itself.
That's all, Thank you for reading.
------------------------------
■ Previous / Next Column ■
<<< Next Column Vol.57 - You're actually already using cloud services quite well 2015.09.01
>>> Previous Column Vol.55 - Should you have a website and email on your own domain? 2015.07.01
Sending your message. Please wait...