We talk a lot about protecting your IT systems and all the many unguarded ports of entry hackers can exploit. Sure, some hackers just want to cripple your systems (e.g., with ransomware or DDoS attacks), but most are after one thing: your data. Experts say that there will be 175 zettabytes of data around the world by 2025. That's a lot of data that could potentially be targeted by cyber thieves. In this post, we share insights on the most common SQL Server security vulnerabilities, where your data may be most vulnerable and what you can do to slam the door on would-be cybercriminals.

Protecting-your-data-in-SQL-Server-2016

An example of a specific SQL server vulnerability and defense

A SQL Injection attack is an example of a common SQL server vulnerability. In a SQL injection attack, the attacker inputs or “injects” malicious SQL commands into a SQL database. These commands can execute a variety of actions, e.g., transfer, erase, or alter the contents of the database. A sophisticated attack can even shut down the database.

According to the Web Hacking Incidents Database (WHID), SQL injections are the top attack vector, making up 19% of all security breaches - even more in some sectors. For instance, SQL Injection attacks account for more than 40% of all cyber attacks in the financial services sector.

SQL injection attacks can be prevented by deploying several SQL Server best practices, including parameterization and input validation. Check out our recent post on 7 Ways to Protect Against SQL Injection Attacks.

Managing SQL server effectively

Managing SQL Server security for your organization is a big job with a lot of moving parts. We’ve put together a new eBook to help you think about how to approach SQL Server security and overcome some of the obstacles you may encounter. Have more questions? Contact us today.

New call-to-action

 

Subscribe to the TierPoint blog We'll send you a link to new blog posts whenever we publish, usually once a week.