{"id":4911,"date":"2014-04-09T16:03:09","date_gmt":"2014-04-09T20:03:09","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=4911"},"modified":"2024-12-12T13:37:02","modified_gmt":"2024-12-12T18:37:02","slug":"beyond-the-breach","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/","title":{"rendered":"Breached But Still Protected"},"content":{"rendered":"<p><strong>Data Privacy on Fire<br \/>\n<\/strong><span style=\"line-height: 1.5em;\">For the past 20 years or so, data breach headlines continue to capture public and legal attention. Significant data breaches are chronicled at the Privacy Rights Clearinghouse on <a href=\"https:\/\/privacyrights.org\/data-breaches\">this page<\/a>.<\/span><\/p>\n<p>Whether the sources of the breach is from phishing, ransomware, an insider, unprotected database, spreadsheet, or stolen laptop, there is one common truth: criminals are willing and able to find as many ways as possible to access and exploit personally identifiable information (PII).<\/p>\n<p><strong> Sparks Everywhere<br \/>\n<\/strong>According to PC World, &#8220;there are a few factors that combine to fuel this trend. First, credit card data and related customer information are a goldmine for attackers. The information can be used to clone credit cards, and the associated personal details may be useful for additional credit fraud and identity theft.&#8221;<\/p>\n<p>The aging but still apt article entitled <a title=\"Retailer Data Breach Not Likely to End Soon - PC World\" href=\"http:\/\/www.pcworld.com\/article\/2090839\/retailer-data-breach-trend-not-likely-to-end-soon.html\" target=\"_blank\" rel=\"noopener\"><em>Retailer Data Breach Trend Not Likely to End Soon<\/em><\/a> focuses on just what happens in the retail and restaurant industry. However, these incidents are not confined to those sectors, and occur in BFSI, healthcare, educational institutions, and government. So for a problem that is so rampant, what&#8217;s being done to better protect consumer data?<\/p>\n<p>From the standpoints of consumers trying to protect their privacy and corporations maintaining their data, the most common defenses are prevention, detection, and remediation. But the reality is things are getting worse, not better.<\/p>\n<p><strong>Let it Burn?<br \/>\n<\/strong>IRI has a different strategy &#8211; breach nullification. Yes, of course do everything you can to prevent access to the data. Secure the network with firewalls, sniffers, appliances, and by all means lock down your databases and devices.<\/p>\n<p>But at the end of the day, if the thieves finally do get access to that data at rest, is all lost? We say no. What the PII columns or values in your data sources were already masked with granular protection functions (much less one that you could keep changing)? It&#8217;s much harder to identify or impersonate a consumer from an exposed record (even if just one column were decrypted) when their associated\u00a0data have their own encryption, redaction, hashing, tokenization, or other concealment function applied &#8230; functions the same thief cannot readily reverse.\u00a0 Decryption keys can differentiated or even &#8220;scattered to the wind&#8221; this way too; i.e., even if they got one, they&#8217;d still need a lot more than one to mine the gold.<\/p>\n<p>The point is, targeted and consistent\u00a0<a href=\"https:\/\/www.iri.com\/solutions\/data-masking\" target=\"_blank\" rel=\"noopener\">data masking<\/a> functions that you choose to apply to key (and quasi-) identifiers can nullify, or at least, retard, the fire damage from a data breach. Take a look at the tools in the <a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\">IRI Data Protector Suite<\/a> that are designed to mitigate data breaches, comply with data privacy laws, and serve up test data. Then, tell us about your use case, and we&#8217;ll help you prototype a solution to protect the consumer, patient, student, or secret data that you keep.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Privacy on Fire For the past 20 years or so, data breach headlines continue to capture public and legal attention. Significant data breaches are chronicled at the Privacy Rights Clearinghouse on this page. Whether the sources of the breach is from phishing, ransomware, an insider, unprotected database, spreadsheet, or stolen laptop, there is one<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\" title=\"Breached But Still Protected\">Read More<\/a><\/div>\n","protected":false},"author":5,"featured_media":12803,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[406,405,14,18,203,9,205,404,149,342],"class_list":["post-4911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-breach-nullification","tag-data-breach","tag-data-masking","tag-data-privacy","tag-encryption","tag-fieldshield","tag-hashing","tag-heartbleed","tag-pii","tag-tokenization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Breached But Still Protected - IRI<\/title>\n<meta name=\"description\" content=\"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Breached But Still Protected\" \/>\n<meta property=\"og:description\" content=\"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-09T20:03:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-12T18:37:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"833\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Koivu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Koivu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"},\"author\":{\"name\":\"Jason Koivu\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df\"},\"headline\":\"Breached But Still Protected\",\"datePublished\":\"2014-04-09T20:03:09+00:00\",\"dateModified\":\"2024-12-12T18:37:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"},\"wordCount\":486,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg\",\"keywords\":[\"breach nullification\",\"data breach\",\"data masking\",\"data privacy\",\"encryption\",\"FieldShield\",\"hashing\",\"heartbleed\",\"PII\",\"tokenization\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\",\"name\":\"Breached But Still Protected - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg\",\"datePublished\":\"2014-04-09T20:03:09+00:00\",\"dateModified\":\"2024-12-12T18:37:02+00:00\",\"description\":\"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg\",\"width\":1110,\"height\":833},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Breached But Still Protected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df\",\"name\":\"Jason Koivu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g\",\"caption\":\"Jason Koivu\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/jasonk\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Breached But Still Protected - IRI","description":"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/","og_locale":"en_US","og_type":"article","og_title":"Breached But Still Protected","og_description":"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/","og_site_name":"IRI","article_published_time":"2014-04-09T20:03:09+00:00","article_modified_time":"2024-12-12T18:37:02+00:00","og_image":[{"width":1110,"height":833,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","type":"image\/jpeg"}],"author":"Jason Koivu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Koivu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/"},"author":{"name":"Jason Koivu","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df"},"headline":"Breached But Still Protected","datePublished":"2014-04-09T20:03:09+00:00","dateModified":"2024-12-12T18:37:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/"},"wordCount":486,"commentCount":1,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","keywords":["breach nullification","data breach","data masking","data privacy","encryption","FieldShield","hashing","heartbleed","PII","tokenization"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/","name":"Breached But Still Protected - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","datePublished":"2014-04-09T20:03:09+00:00","dateModified":"2024-12-12T18:37:02+00:00","description":"Uncover the truth about data breaches and their dangers. Learn how to mitigate data breaches by masking PII in your sources ahead of time","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","width":1110,"height":833},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Breached But Still Protected"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df","name":"Jason Koivu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g","caption":"Jason Koivu"},"url":"https:\/\/www.iri.com\/blog\/author\/jasonk\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/04\/fire-298105_1920-1.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/4911"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=4911"}],"version-history":[{"count":23,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/4911\/revisions"}],"predecessor-version":[{"id":18147,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/4911\/revisions\/18147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/12803"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=4911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=4911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=4911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}