BtoB Media Business - February 2011 - (Page 15)
AUDIENCE DEVELOPMENT
Audience Development
Safety first
Online firewalls and in-person visits help ensure data security
BY MARK J. MILLER
T
rust is a priority in a publisher’s relationship with its audience. In a world where companies such as Gawker Media, McDonald’s and Walgreens all had their databases hacked in early December, what can audience developers do to protect the sanctity of the information shared by an audience? Brian Clark, VP-information systems at Omeda, said audience developers should be on guard against both physical and electronic theft. “The most publicized is the electronic breach, typically performed for financial gain by hackers or malicious employees,” Clark said. “The other type of breach is the physical breach, such as the theft of a laptop computer or of a backup tape of a database.” David Fry, chief technology officer at Fry Communications, said sensitive data must be kept in a place that is safe and isolated from the Internet and from those who do not need to have access. “That means information should be stored in an encrypted format in a database that is protected behind a well-maintained firewall,” he said. “Access to the encryption keys should only be available to
those who are required to have access.” Encryption keys should be regularly changed, Fry advised. Advanced security techniques such as intrusion detection and log analysis should be used to assure that no intruder has quietly accessed the data. Firewall, intrusion prevention and denial-of-service prevention technologies that are continually updated are all elements that can help protect files electronically, Clark said. “Physical breaches are prevented through controlled and monitored access to Omeda’s building and our data center,” Clark said. His company makes use of electronic key cards, video monitoring, application and network logons, and an overall building electronic security system that is linked to the nearby police department. Fry said there are major industry standards for every publisher to follow and that it needs to be made clear to consumers that they are being followed. The privacy policy must outline “what data is gathered, how it is used, when it is shared (if ever), and what the users’ protections are,” Fry said. Gene Bishop, VP-technology at ALM, noted that the “elephant in the room” is that getting someone’s e-mail address is “the holy grail,” he said. “We play it off like, ‘Well, it’s just your e-mail address, but it’s just as personal these days as your phone number.” He added: “Trust needs to be built and cared for if you want to continue to do business at any level, especially if you want to have it over and over again like a subscription model.”
mediabusinessonline.com | February 2011 | Media Business | 15
http://www.mediabusinessonline.com
Table of Contents for the Digital Edition of BtoB Media Business - February 2011
Btob Media Business - February 2011
Contents
Upfront
State of B-to-B Media
Social, Mobile Drive New Lead-Gen Techniques
Sales & Marketing
Audience Development
People
Benchmarks
Endnote
BtoB Media Business - February 2011
https://www.nxtbook.com/nxtbooks/crain/mb1112
https://www.nxtbook.com/nxtbooks/crain/mb1012
https://www.nxtbook.com/nxtbooks/crain/mb0912
https://www.nxtbook.com/nxtbooks/crain/mb0212
https://www.nxtbook.com/nxtbooks/crain/mb0312
https://www.nxtbook.com/nxtbooks/crain/mb0412
https://www.nxtbook.com/nxtbooks/crain/mb0612
https://www.nxtbook.com/nxtbooks/crain/mb0512
https://www.nxtbook.com/nxtbooks/crain/mb1111
https://www.nxtbook.com/nxtbooks/crain/mb1011
https://www.nxtbook.com/nxtbooks/crain/mb0911
https://www.nxtbook.com/nxtbooks/crain/mb0611
https://www.nxtbook.com/nxtbooks/crain/mb0511
https://www.nxtbook.com/nxtbooks/crain/mb0411
https://www.nxtbook.com/nxtbooks/crain/mb0311
https://www.nxtbook.com/nxtbooks/crain/mb0211
https://www.nxtbook.com/nxtbooks/crain/mb1210
https://www.nxtbook.com/nxtbooks/crain/mb1110
https://www.nxtbook.com/nxtbooks/crain/mb1010
https://www.nxtbook.com/nxtbooks/crain/mb0910
https://www.nxtbook.com/nxtbooks/crain/mb0710
https://www.nxtbook.com/nxtbooks/crain/mb0610
https://www.nxtbook.com/nxtbooks/crain/mb0510
https://www.nxtbook.com/nxtbooks/crain/mb0410
https://www.nxtbook.com/nxtbooks/crain/mb0310
https://www.nxtbook.com/nxtbooks/crain/mb0210
https://www.nxtbook.com/nxtbooks/crain/mb1209
https://www.nxtbook.com/nxtbooks/crain/mb1109
https://www.nxtbook.com/nxtbooks/crain/mb1009
https://www.nxtbook.com/nxtbooks/crain/mb0909
https://www.nxtbook.com/nxtbooks/crain/mb0709
https://www.nxtbook.com/nxtbooks/crain/mb0609
https://www.nxtbook.com/nxtbooks/crain/mb0509
https://www.nxtbook.com/nxtbooks/crain/mb0409
https://www.nxtbook.com/nxtbooks/crain/mb0309
https://www.nxtbook.com/nxtbooks/crain/mb0209
https://www.nxtbook.com/nxtbooks/crain/mb1208
https://www.nxtbook.com/nxtbooks/crain/mb1108
https://www.nxtbook.com/nxtbooks/crain/mb1008
https://www.nxtbook.com/nxtbooks/crain/mb0908
https://www.nxtbook.com/nxtbooks/crain/mb0708
https://www.nxtbook.com/nxtbooks/crain/mb0608
https://www.nxtbook.com/nxtbooks/crain/mb0508
https://www.nxtbook.com/nxtbooks/crain/mb0408
https://www.nxtbook.com/nxtbooks/crain/mb0308
https://www.nxtbook.com/nxtbooks/crain/mb0208
https://www.nxtbook.com/nxtbooks/crain/mb0108
https://www.nxtbook.com/nxtbooks/crain/mb0707
https://www.nxtbook.com/nxtbooks/crain/mb0607
https://www.nxtbook.com/nxtbooks/crain/mb0507
https://www.nxtbook.com/nxtbooks/crain/mb0407
https://www.nxtbook.com/nxtbooks/crain/mb0307
https://www.nxtbook.com/nxtbooks/crain/mb0207
https://www.nxtbook.com/nxtbooks/crain/mb0107
https://www.nxtbook.com/nxtbooks/crain/mb1206
https://www.nxtbookmedia.com