{"id":3008,"date":"2019-01-30T07:35:24","date_gmt":"2019-01-30T13:35:24","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=3008"},"modified":"2019-01-30T07:35:24","modified_gmt":"2019-01-30T13:35:24","slug":"really-know-data","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/really-know-data\/","title":{"rendered":"Do You Really Know Where Your Data Is?"},"content":{"rendered":"
Data, Data, Data\u2014must be phenomenal or something precious because there’s no end to conversations about how to get, analyze, or protect it. We’re witnessing a strong and growing appetite for enterprise data all over the world, and according to some\u00a0estimates<\/a>, the increased proliferation of IT assets will see the data we create every year hit 44 trillion gigabytes by 2020. Sadly, the digital universe is not 100% safe, and the information it holds continues to face every kind of cyber threat imaginable today!<\/p>\n But before discussing cybersecurity, just how vital or invaluable is your enterprise data? It all depends on two main things: what you’re getting from exploiting it, and how much it’d cost were you to lose it! If you’re like many enterprises harvesting data from numerous structured and unstructured sources, you’re certainly looking to extract invaluable business insights with the ultimate objective of driving sales. Today, data analytics can help your company grow its revenue in ways such as:<\/p>\n On the other hand, losing your data can have far-reaching financial and legal ramifications. A 2017 study by\u00a0Ponemon<\/a> Institute<\/a>\u00a0found the average cost of a stolen or destroyed record to be $141. Now, multiply that figure by the thousands, tens of thousands, or even hundreds of thousands of customer records in your database! If somebody were to access your entire database illegally, the potential financial loss would be mind-boggling. Keep in mind that your staff information, critical business insights, and trade secrets are also worth good money in the black market, making them highly vulnerable to data breach.<\/p>\n Even if you were to recover all the data you lost in a typical breach, you’d still have to confront some potentially costly legal realities related to data compliance. For example, the US Federal Trade Commission (FTC) slapped VTech with a $650,000\u00a0fine<\/a>\u00a0over poor data security practices. Today, under\u00a0the General Data Protection Regulation (GDPR),<\/a>\u00a0the EU may fine any company up to 4% of annual worldwide revenue for violating personal data security rules.<\/p>\n Quite clearly, it’s in your best financial and legal interests to lock all your company and customer data in a secure “vault” that only authorized persons can access. Here are the top practices for guarding against enterprise data loss and inadvertent disclosure:<\/p>\n 1. Know Where Your Data Is<\/p>\n So, what’s the origin of all your exponentially-growing data? Is it social media, your business website, email, collaboration systems, heterogeneous databases, or cloud-hosted file-sharing platforms? The answers to these questions should form the foundation of your data security practices. Through discovery processes, track your structured and unstructured data sources, and determine what’s in there. To do that, you’ll need to use\u00a0data discovery tools<\/a>\u00a0capable of scanning your entire digital footprint and endpoints.<\/p>\n 2. Know What Type Your Data Is<\/p>\n After tracking your data, classify it. Classification is the processes of figuring out data types, such as Social Security numbers (SSNs). Who else values your data and, therefore, may want to steal it? How might inadvertent disclosure affect the victim? Answers to these questions will help you establish how sensitive each data type is.<\/p>\n If you’re also categorizing semi-structured data, techniques like fuzzy logic or syntactic analysis may help. Likewise, some classification algorithms may identify sensitive data based on certain predetermined trends, behaviors, or traditions associated with customers.<\/p>\n In a nutshell, data discovery and classification helps:<\/p>\n 3. Execute an IT Security Risk Assessment<\/p>\n After determining where your data is, it’s time to figure out how secure it is. The practice involves evaluating, identifying, and changing your company’s general\u00a0data security posture<\/a>\u00a0to fix existing vulnerabilities and address data compliance concerns. A thorough IT security assessment must cover:<\/p>\n To identify specific data security threats in your organization, evaluate the security systems and solutions currently in use. These may include:<\/p>\n It’s also imperative to analyze workflows and IT processes within your organization. Don’t forget to assess your level of compliance with government laws and regulations regarding personal data security.<\/p>\n Equally important, assess the current level of security awareness among your employees. Are they fully committed to the cause? What’s the likelihood of an inadvertent breach of confidentially occurring, such as after an employee accesses your office network from their unprotected personal device? What are the security protocols in place to ensure that customers and vendors interacting with your system do not pose a significant threat to your data?<\/p>\n 4. Engage the Pros<\/p>\n Any small or medium-sized enterprise may stretch its resources quickly trying to secure the sheer volume of data flowing in at unprecedented speed. Tracking different potentially disjointed repositories while complying with personal data security regulations may also overwhelm many in-house data controllers. This is where data loss prevention experts usually come in. At Kraft Technology Group, we offer a range of cost-effective cybersecurity solutions to enterprises across diverse industries. You can count on us when you need help tracking, identifying, and securing your data, no matter its source or size. We’re conversant with the latest industry regulations for data protection, including HIPAA, GDPR, and GLBA, and we can help you comply.\u00a0Contact us<\/a>\u00a0right away regarding your cybersecurity needs!<\/p>\n","protected":false},"excerpt":{"rendered":" Data, Data, Data\u2014must be phenomenal or something precious because there’s no end to conversations about how to get, analyze, or protect it. We’re witnessing a strong and growing appetite for enterprise data […]<\/p>\n","protected":false},"author":1,"featured_media":3009,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-3008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n\n
\n
\n
\n