IBM Systems Magazine, Mainframe - March/April 2016 - 22

CURRENTS

But as data breaches occur
more often, they're getting more
media coverage. Recent news
stories have highlighted hacks
involving movie studio emails,
unauthorized logins and access to
healthcare company records. As
a result, the average consumer is
paying more attention.
Many people are responding
by taking proactive steps such
as buying monitoring plans to
check their credit records or
freezing their credit altogether,
Ponemon says. And they may stop
frequenting businesses that have
security breaches.
Not only could that cause
income loss, but businesses with
a spotty reputation for protecting
information may have a harder
time earning new customers,
which would likely increase
their customer acquisition costs.
It's crucial for companies to
know how to identify and block
potential security breaches.

Understanding
Hacker Motivation
Malicious or criminal attacks
were responsible for 47 percent
of all breaches. They also were
costlier than breaches caused by
other reasons, such as technology
glitches or human error, according
to the study. When it comes to
malicious attacks, generally four
categories of hackers exist:
ĀÃ

&ULPLQDOÃV\QGLFDWHV
These organized groups
tend to have sophisticated
operations and are
financially motivated. They

Learn More
Download the "Cost
of Data Breach" report:
ibm.com/security/
data-breach

ĀÃ

ĀÃ

ĀÃ

plan to monetize security
attacks on companies by
selling stolen records or
conducting similar acts of
criminal behavior.
6WDWHVSRQVRUHGÃDWWDFNHUVÃ
6LPLODUÃWRÃFULPLQDOÃJURXSVÃ
these hackers often
operate with the support
of a government.
+DFNWLYLVWV These hackers
breach a company's data to
advance an activist cause.
"They don't do it to monetize;
they do it to make a point.
They'll try to embarrass
the company by exposing
confidential information,
such as exposing a
company's human resources
records," Ponemon says.
/RQHÃZROYHVÃ7KHVHÃSHRSOHÃ
act alone and may view
hacking into a company's
data as a challenge. They
want to get into a system just
because it's there-they find
it interesting or want to get
away with it.

Unintentional Breaches
Are Also Costly
Though criminals are responsible
for a large portion of data
breaches, problems can also
be caused by technology
malfunctions and human error.
Risky practices employees
engage in can include connecting
company computers to insecure
wireless networks, sharing
passwords with others and
leaving computers unattended
while outside of a secure worksite.
"Good people make mistakes,"
Ponemon remarks. But as a result,
an unintentional data breach
could cost a company millions.
On a positive note, it may take
less time to recognize unintentional
security breaches and take steps to
stop them. According to the study,
it took 158 days on average to iden
tify human error breaches, while

22 // MARCH/APRIL 2016 ibmsystemsmag.com

malicious attacks were discovered
after an average of 256 days.

Implementing the Right
Security Measures


158 days
Average time to
identify human
error breaches

A company can protect its
systems in many ways. While
no measure is foolproof all of
the time, Ponemon says taking
these steps can help a company
prevent-or at least quickly
respond to-cyberattacks:
ĀÃ

1
Malicious
or criminal
attacks were
responsible for

47%
of all
breaches

ĀÃ


256 days
Average time
to discover
malicious
attacks

ĀÃ

(GXFDWHÃHPSOR\HHVÃDERXWÃ
security protocols. (QDFWÃ
policies that call for regularly
changing passwords,
and implement robust
authentication to help
prevent unauthorized access
to company computers.
Once companywide security
processes are in place,
regularly communicate them
to employees.
(VWDEOLVKÃJRYHUQDQFHÃ
SURFHVVHVÃ6HWÃXSÃFRPPDQGÃ
and control responsibility
within the company for secu
rity and infrastructure, and
task someone with address
ing any problems that come
up in real time. Appointing a
strong leader who can set an
agenda and has high report
ing authority is important.
As part of those
procedures, organizations
should be ready to respond
quickly to crises. "The
security problems you
learn about today are going
to be the problems you'll
want to deal with today, so
having a process in place is
important to building a fast,
effective incident response
team," he adds.
6WD\ÃXSÃWRÃGDWHÃRQÃ
technology tools. You'll
want to have appropriate
firewalls, intrusion
prevention and intrusion
detection technology, which


http://www.ibm.com/security/data-breach http://www.ibm.com/security/data-breach http://www.ibmsystemsmag.com

IBM Systems Magazine, Mainframe - March/April 2016

Table of Contents for the Digital Edition of IBM Systems Magazine, Mainframe - March/April 2016

Table of Contents
Editor's Desk: A secure connection
Techbits: Sphere of influence
Infographic: Hybrid integration: Can you keep up?
Partner PoV: RACF needs complementary applications for total enterprise protection
R&D: IBM explores how affective computing can benefit society
IT Today: OpenStack solutions help address compliance needs and audit standards
Currents: Ponemon data breach study should encourage you to be proactive
Cover Story: The Future of Business: New IBM z13s and its growing ecosystem help clients unleash digital innovation with cloud agility and cybersecurity
Feature: The Mobile App Advantage: Real-world cases show how to maximize information to achieve results in the cognitive era
Tech Showcase: DevOps helps transform development practices to meet today's business demands
Tech Corner: With z/OS V2.1, IBM DB2 features include automation and copy improvements
Solutions: (E)JES V5.5; EasySMF; JE; Offline Access Recovery; SIEM Agent for IBM z/OS with IND$defender; SMA_RT V3.3
Stop Run: The Web's mainframe past isn't gone; it's archived on various sites
Reference Point - Global Events, Education, Resources for Mainframe
2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - March/April 2016 - Intro
IBM Systems Magazine, Mainframe - March/April 2016 - Cover1
IBM Systems Magazine, Mainframe - March/April 2016 - Cover2
IBM Systems Magazine, Mainframe - March/April 2016 - 1
IBM Systems Magazine, Mainframe - March/April 2016 - Table of Contents
IBM Systems Magazine, Mainframe - March/April 2016 - 3
IBM Systems Magazine, Mainframe - March/April 2016 - 4
IBM Systems Magazine, Mainframe - March/April 2016 - 5
IBM Systems Magazine, Mainframe - March/April 2016 - Editor's Desk: A secure connection
IBM Systems Magazine, Mainframe - March/April 2016 - 7
IBM Systems Magazine, Mainframe - March/April 2016 - Techbits: Sphere of influence
IBM Systems Magazine, Mainframe - March/April 2016 - Infographic: Hybrid integration: Can you keep up?
IBM Systems Magazine, Mainframe - March/April 2016 - Partner PoV: RACF needs complementary applications for total enterprise protection
IBM Systems Magazine, Mainframe - March/April 2016 - 11
IBM Systems Magazine, Mainframe - March/April 2016 - 12
IBM Systems Magazine, Mainframe - March/April 2016 - R&D: IBM explores how affective computing can benefit society
IBM Systems Magazine, Mainframe - March/April 2016 - 14
IBM Systems Magazine, Mainframe - March/April 2016 - 15
IBM Systems Magazine, Mainframe - March/April 2016 - IT Today: OpenStack solutions help address compliance needs and audit standards
IBM Systems Magazine, Mainframe - March/April 2016 - 17
IBM Systems Magazine, Mainframe - March/April 2016 - 18
IBM Systems Magazine, Mainframe - March/April 2016 - 19
IBM Systems Magazine, Mainframe - March/April 2016 - Currents: Ponemon data breach study should encourage you to be proactive
IBM Systems Magazine, Mainframe - March/April 2016 - 21
IBM Systems Magazine, Mainframe - March/April 2016 - 22
IBM Systems Magazine, Mainframe - March/April 2016 - 23
IBM Systems Magazine, Mainframe - March/April 2016 - Cover Story: The Future of Business: New IBM z13s and its growing ecosystem help clients unleash digital innovation with cloud agility and cybersecurity
IBM Systems Magazine, Mainframe - March/April 2016 - 25
IBM Systems Magazine, Mainframe - March/April 2016 - 26
IBM Systems Magazine, Mainframe - March/April 2016 - 27
IBM Systems Magazine, Mainframe - March/April 2016 - 28
IBM Systems Magazine, Mainframe - March/April 2016 - 29
IBM Systems Magazine, Mainframe - March/April 2016 - Feature: The Mobile App Advantage: Real-world cases show how to maximize information to achieve results in the cognitive era
IBM Systems Magazine, Mainframe - March/April 2016 - 31
IBM Systems Magazine, Mainframe - March/April 2016 - 32
IBM Systems Magazine, Mainframe - March/April 2016 - 33
IBM Systems Magazine, Mainframe - March/April 2016 - 34
IBM Systems Magazine, Mainframe - March/April 2016 - Tech Showcase: DevOps helps transform development practices to meet today's business demands
IBM Systems Magazine, Mainframe - March/April 2016 - 36
IBM Systems Magazine, Mainframe - March/April 2016 - 37
IBM Systems Magazine, Mainframe - March/April 2016 - 38
IBM Systems Magazine, Mainframe - March/April 2016 - 39
IBM Systems Magazine, Mainframe - March/April 2016 - 40
IBM Systems Magazine, Mainframe - March/April 2016 - 41
IBM Systems Magazine, Mainframe - March/April 2016 - 42
IBM Systems Magazine, Mainframe - March/April 2016 - Tech Corner: With z/OS V2.1, IBM DB2 features include automation and copy improvements
IBM Systems Magazine, Mainframe - March/April 2016 - 44
IBM Systems Magazine, Mainframe - March/April 2016 - 45
IBM Systems Magazine, Mainframe - March/April 2016 - Solutions: (E)JES V5.5; EasySMF; JE; Offline Access Recovery; SIEM Agent for IBM z/OS with IND$defender; SMA_RT V3.3
IBM Systems Magazine, Mainframe - March/April 2016 - 47
IBM Systems Magazine, Mainframe - March/April 2016 - Stop Run: The Web's mainframe past isn't gone; it's archived on various sites
IBM Systems Magazine, Mainframe - March/April 2016 - Cover3
IBM Systems Magazine, Mainframe - March/April 2016 - Cover4
IBM Systems Magazine, Mainframe - March/April 2016 - Reference Point - Global Events, Education, Resources for Mainframe
IBM Systems Magazine, Mainframe - March/April 2016 - 2016 Mainframe Solutions Edition Product Index
IBM Systems Magazine, Mainframe - March/April 2016 - SE2
IBM Systems Magazine, Mainframe - March/April 2016 - SE3
IBM Systems Magazine, Mainframe - March/April 2016 - SE4
IBM Systems Magazine, Mainframe - March/April 2016 - SE5
http://www.ibmsystemsmagmainframedigital.com/mspcomm/ibmsystemsmag/ibmsystems_mainframe_20200708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20200102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2020mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20191112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/relevantz_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2019mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20190102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20181112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20180102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/2018mfse
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20171112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_sesupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20170102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_linuxsupp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20161112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/MainframeSecurity
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20160102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20151112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910_se
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150910
http://www.ibmsystemsmagmainframedigital.com/MFSkills
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506_supp
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20150102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20141112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_gt_201405
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/BigData
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20140102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20131112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910_v2
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20130102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20121112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/buyersguide2013
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20120102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/ibmsystems_mainframe_2012bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20111112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20110102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20101112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100910_bg
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100506
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100304
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20100102
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20091112
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090910
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090708
http://www.ibmsystemsmagmainframedigital.com/nxtbooks/ibmsystemsmag/mainframe_20090506
https://www.nxtbook.com/nxtbooks/ibmsystemsmag/mainframe_20090304
https://www.nxtbookmedia.com