educational

Data Security

Data security. It's one of the issues weighing heavily on my mind as of late. With the first anniversary of the September 11th attacks looming near, Americans will be bombarded by a seemingly endless string of prime time memorials, remembrances, and documentaries mourning the loss of so many victims, and indeed, the loss of what remained of our 'innocence.' I wonder though: how much mention will be made of what must have been an enormous — and expensive — loss of sensitive corporate data on that fateful day:

It is a subject that is easily overshadowed by the enormous toll of victims, and the grief of their survivors, but those unforeseen events, inflicted upon one of the world's most sensitive data centers, sent shockwaves running throughout the global economy, the repercussions of which could have been far more severe had so many of the company's involved not invested in off-site data storage and redundant network backups.

Preparing for the unexpected, with a goal of mitigating loss in the face of the unthinkable, should form the basic cornerstone of every organization's data security policy; because you will likely never know where, how, when, or why a catastrophic data loss, corruption, or alteration, might occur. One thing is for certain, however: such a loss can, and probably will occur. If this doesn't (or hasn't yet), then you should consider yourself to be extremely lucky; but is relying upon 'luck' the way you wish to run your business?

Beyond the Firewall
I read an article the other day about corporate data security, where the author likened many company's approach to that of a tasty cream-filled chocolate: what you see on the outside may be a 'hard shell,' but if you bite into it, what you will find inside is a soft, creamy center. This metaphor was used to describe the false sense of security that many organizations feel after installing their network's firewall; as if the only threat to their data came from the outside:

While it's comforting(?) to think that marauding teenage hackers, motivated by either curiosity or mischief, form the basis and extent of your threat, the truth is far more insidious: the greatest threat to your valuable information comes from within your own organization. Whether the result of carelessness, improper training, systems failure, corporate espionage, or the malicious work of disgruntled employees, the very real threats to your data's security are myriad.

Consider the importance of your most vital documents: business and marketing plans, financial reports and revenue projections, customer lists and strategic planning forecasts, password lists and user data — in short, everything that you use to run and profit from your business. Add to this the tremendous responsibility of maintaining and securing personal, personnel information (an often overlooked security problem in today's highly litigious society). Does your company collect or store user's credit card information, social security numbers or any other sensitive customer data? What about online banking and tax records? Is there anything 'irreplaceable' on your 'PC'? The list of digital treasures that must be safeguarded is nearly as endless as the threats that face them: This means that all the information that we assume magically went down some big black hole in CyberSpace is being electronically stored on hard drives and other media:

After the Delete Key
Now consider your "Recycle Bin." It sits there on your 'Desktop' holding all of those unused files that you no longer need, and that you wish would just disappear. All that unwanted SPAM, all of those viruses that came in as e-mail attachments, all of those 'rough drafts' from your latest project. All of your most sensitive personal and business documents and other confidential items that you wouldn't want your mother to see: All just one 'right-click' away from never being seen again: "Empty Recycle Bin" and all your worries and digital debris will spiral round the virtual toilet bowl, flushing out among vast wastelands of discarded data.

But what really happens with this 'discarded' data? It doesn't (in most cases) simply 'disappear;' the tracks on your hard drive that contain the deleted file's data are (usually) simply reassigned as now being available to store new data. If your computer is connected to a network (including the Internet), then your disk drives are more or less accessible by anyone else who is connected to the network — depending upon their level of authorization, skill or knowledge, and YOUR level of security, skill, and knowledge. Remember the candy?

This means that all the information that we assume magically went down some big black hole in CyberSpace is being electronically stored on hard drives and other media, potentially accessible by computer users from all over the world: many of whom do not have your best interests at heart. This is information that is routinely sifted and mined for both corporate and governmental intelligence information on an infinite variety of levels, but now I'm starting to 'talk out of school.' Suffice it to say that the very real threats to your data come from every direction, and it is your responsibility to safeguard it as best you can.

As for me, I'm backing up the important things, burning CDs and securely storing them off-site. I'm also learning more about security, 'how things work,' and trying to figure out why my WinXP box' disk drive keeps diddling around while my router/WAP and cable modem still wildly blink — when *I'm not* using them! Hmmmmm::
~ Stephen

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

WIA Profile: Lainie Speiser

With her fiery red hair and a laugh that practically hugs you, Lainie Speiser is impossible to miss. Having repped some of adult’s biggest stars during her 30-plus years in the business, the veteran publicist is also a treasure trove of tales dating back to the days when print was king and social media not even a glimmer in the industry’s eye.

Women in Adult ·
opinion

Fighting Back Against AI-Fueled Fake Takedown Notices

The digital landscape is increasingly being shaped by artificial intelligence, and while AI offers immense potential, it’s also being weaponized. One disturbing trend that directly impacts adult businesses is AI-powered “DMCA takedown services” generating a flood of fraudulent Digital Millennium Copyright Act (DMCA) notices.

Corey D. Silverstein ·
opinion

Building Seamless Checkout Flows for High-Risk Merchants

For high-risk merchants such as adult businesses, crypto payments are no longer just a backup plan — they’re fast becoming a first choice. More and more businesses are embracing Bitcoin and other digital currencies for consumer transactions.

Jonathan Corona ·
opinion

What the New SCOTUS Ruling Means for AV Laws and Free Speech

On June 27, 2025, the United States Supreme Court handed down its landmark decision in Free Speech Coalition v. Paxton, upholding Texas’ age verification law in the face of a constitutional challenge and setting a new precedent that bolsters similar laws around the country.

Lawrence G. Walters ·
opinion

What You Need to Know Before Relocating Your Adult Business Abroad

Over the last several months, a noticeable trend has emerged: several of our U.S.-based merchants have decided to “pick up shop” and relocate to European countries. On the surface, this sounds idyllic. I imagine some of my favorite clients sipping coffee or wine at sidewalk cafés, embracing a slower pace of life.

Cathy Beardsley ·
profile

WIA Profile: Salima

When Salima first entered the adult space in her mid-20s, becoming a power player wasn’t even on her radar. She was simply looking to learn. Over the years, however, her instinct for strategy, trust in her teams and commitment to creator-first innovation led her from the trade show floor to the executive suite.

Women in Adult ·
opinion

How the Interstate Obscenity Definition Act Could Impact Adult Businesses

Congress is considering a bill that would change the well-settled definition of obscenity and create extensive new risks for the adult industry. The Interstate Obscenity Definition Act, introduced by Sen. Mike Lee, makes a mockery of the First Amendment and should be roundly rejected.

Lawrence G. Walters ·
opinion

What US Sites Need to Know About UK's Online Safety Act

In a high-risk space like the adult industry, overlooking or ignoring ever-changing rules and regulations can cost you dearly. In the United Kingdom, significant change has now arrived in the form of the Online Safety Act — and failure to comply with its requirements could cost merchants millions of dollars in fines.

Cathy Beardsley ·
opinion

Understanding the MATCH List and How to Avoid Getting Blacklisted

Business is booming, sales are steady and your customer base is growing. Everything seems to be running smoothly — until suddenly, Stripe pulls the plug. With one cold, automated email, your payment processing is shut down. No warning, no explanation.

Jonathan Corona ·
profile

WIA Profile: Leah Koons

If you’ve been to an industry event lately, odds are you’ve heard Leah Koons even before you’ve seen her. As Fansly’s director of marketing, Koons helps steer one of the fastest-growing creator platforms on the web.

Women in Adult ·
Show More