CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

big-data-collect

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders and Data Collectors

In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data breaches that has increased, it is the sheer volumes of personal data that are being breached that has reached new heights of “out of control”.  This article explores the connections between the physical world of hoarders and the online world of data collectors and proposes ways to reign in control of our data.

Big Data Bloat

shutterstock_179396102

In our digital world, providers of all kinds of services can’t seem to collect enough data on us. Whether the use case is marketing, sales or simply for providing improved services, we have become the guinea pigs for today’s Big Data analysis. And, the more services we sign up for the more data that is processed on us and stored or transacted on back end clouds. It’s not just that the data that is being collected on us, it’s being used to profile us in ways we might not have intended. And, as today’s data-centric world has suddenly crept up on us, there seems to be a lack of due process and corresponding toolsets for securely managing user data.

Hoarding is considered a disorder in our society. It is characterized by a pattern of excessive acquisition and inability to let go of large quantities of objects. Hoarding behaviors are associated with health risks, impaired functioning and economic as well as social burden. Data collectors are hoarders of information. And, like their physical hoarder counterparts their data collection is characterized too by excessive gathering and acquisition. Data collectors may have algorithms and processes for assembling profiles of individuals and in that sense may create more order than the disorder that typically characterizes a hoarder’s physical world. However, as in the physical world, it is hard to manage increasing volumes of things, so too in the digital world realms and realms of data are very challenging to secure. Similar to the physical world where hoarding results in impaired function, the volumes of information that are exposed in data breaches are also symptomatic of impaired function and processing.

So, what’s to be done about it?

Organizations with a data-collecting model need to be proactive. They need to anticipate privacy and security risks in their environment before collecting individuals’ information. While it might sound basic advice, all too often organizations do not take into enough consideration the expectations of consumers that they are collecting information from. Consumers have a right to expect that the organizations they are providing their personal data to take the very necessary precautions, such as auditing and logging, data protection measures such as encryption in its various forms for highly sensitive and confidential data and put into place appropriate consent management and access control mechanisms.

It may run contrary to what many BigData scientists and marketers believe, but taking a minimalist approach might be the single best thing that their organization might do from a security and a privacy standpoint. While marketers may believe that collecting more data improves the accuracy of marketing, if it can’t be handled securely or transacted in in a way that is privacy-preserving the impact to company reputation and brand and not to mention to the individuals whose data may be exposed will far outweigh marketing benefits.

(Image Source: Neonsms)

The real challenge with data minimization will be to decide what information to collect and what to keep as no one single blueprint will apply equally to businesses. And, for data minimization practices to be successful it will require collaboration not just between privacy and security practitioners but also a company’s legal, marketing and Human Resources functions.

I believe that data collectors will end up shedding their current packrat practices as community outrage around the massive exposure of today’s data breaches is only set to increase. And, who knows, a more minimalist approach may also result in just as accurate marketing forecasting and more up-to-date customer profiles.

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

The Lighter Side Of The Cloud - Disaster Recovery Plan
The Lighter Side Of The Cloud - All Platforms
The Lighter Side Of The Cloud - Medical News
The Lighter Side Of The Cloud - Disorganized
Online Courses For Free
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Digital Innovation Starts with a Digital Core

Digital Innovation Starts with a Digital Core

Digital Innovation A lot of times when the prevalent industry trends are discussed among industry folks, there are usually two ...
Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors For technology-loving millennials, robo-advisors may seem appealing. With a robo-advisor, a portfolio is managed online by ...
The 3% Edge: How Data Drives Success in Business and the Olympics

The 3% Edge: How Data Drives Success in Business and the Olympics

Data Drives Success in Business A recent Bloomberg BusinessWeek article entitled “The Tech Guy Building Wearables for America’s Olympians” profiles ...
Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
Technology Cloud Contributor

IoT Data Centers – “We’ve Always Done IoT, We’re Just Terrible At Marketing It”

IoT Data Centers An often repeated phrase by many data center professionals is “We’ve always done IoT, we’re just terrible ...
Technology Certification Courses

Top Five Technology Certification Courses To Choose From In 2018

Technology Certification Courses Gartner predicts that the global public cloud services market is projected to grow by 55 percent in the next three years and is expected to reach $383.3 billion by the end of 2020. Today, cloud computing helps enterprises ...
Automate Service Management

[Free eBook] 150 Ways to Automate Service Management Throughout Your Organization…

Think about an IT Service Catalog as a supermarket of available services. Everyone in your company requests and delivers services from each other. From Human Resources and Marketing to Facilities and Procurement, each department is a service provider to the ...
Infographic - Internet of Things (IoT) Will Be Top Technology Investment

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply way too much money at stake to ignore the potential that is going to truly ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

Cloud CMS Wordpress Alternatives Content management systems (CMS) have grown exponentially in recent years. Their number and features have exploded. There are now dozens of cloud CMS Wordpress alternatives for startups and small business. CMS is getting more sophisticated. Website building ...
Load Testing Tools

Load Testing Tools

Provided is a short list of load testing tools which will test server and application resistance and certainly valuable in order to help test and tweak your company's infrastructure ...