Search

Strengthening data breach protection

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20170027645</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20170830115028.0</controlfield>
    <controlfield tag="008">170824e20170801usa|||p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1=" " ind2=" ">
      <subfield code="0">MAPA20170010975</subfield>
      <subfield code="a">Ehrlich, Matt</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Strengthening data breach protection</subfield>
      <subfield code="c">Matt Ehrlich</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">2 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">In 2016, there were 1,093 data breaches in the United States, a record high and a 40% jump from 2015. This rapid increase should serve as an alarm for businesses to address this ever-persistent and growing security issue. But as businesses look to prevent data breaches from occurring -or, more realistically, plan how to manage them- there is a common misconception that continuously creating and implementing more cybersecurity solutions will stop these incidents. While this may sound counterintuitive, the reality is that there is only so much these solutions can do to stop attackers, especially those who are highly motivated, well-funded or both.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080557515</subfield>
      <subfield code="a">Cibernética</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">01/08/2017 Volumen 64 Número 7 - julio/agosto 2017 , p. 10-11</subfield>
    </datafield>
  </record>
</collection>