How To Overcome Data Insecurity Online

Data Insecurity In The Cloud

Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest to who has access to your data in the public cloud models you use and most importantly that your customer’s data has not been tampered with, corrupted, or leaked?

The New Data Economy

We are moving towards a data economy, where data is a core component of the value of the service or product that is delivered to the customer. In our hyper-connected world data streams are becoming far more personal and intimate than previously. Consider a connected bathroom scale where weight loss or gain patterns might be transmitted from a scale to a backend cloud and where as part of the product, customers have the ability to study their weight patterns over periods of time.

Despite a widespread recognition in the industry of the value and importance of customer data, we live in a perpetual state of data insecurity. It’s not only about the high profile data breaches but it’s also about minimizing accidental risk vectors. In the cloud well intentioned employees who don’t consider the ramifications of oversharing on social media sites, or who accidentally drag and drop sensitive documents from their desktops into email or who upload regulated data into insecure file shares to avoid corporate security measures may be your organization’s biggest risk vector.

Internal Data Marketplace

At the CloudExpo Asia conference last week I referred to the sliver lining in the data insecurity issue. The effects of data loss, misuse and leakage are driving a very necessary change across the business landscape and executives are beginning to get educated on data security issues.

Following are three key steps I recommend to executives as they look to beef up their data security programs with a lens on public cloud

1. Build an internal data marketplace: Organizations need to know the value of their data in order to make the right decisions about whether to host or transact their data in a particular cloud model, and thereafter how to protect it. To calculate the value of data, build an internal marketplace with user entitlements and access controls mapped accordingly. This encourages business users to treat data as part of the business P&L.

2. Learn from your data insecurity history: Organizations have a tendency to want to bury the past especially when it hasn’t been stellar. However, knowing how data has been used and abused in the past is an indicator of how it might be compromised and disclosed in the future. Studying loss trends over time can help organizations forecast future losses and improve prevention and mitigation strategies.

3. Make data protection business-consumable: This is a recurring theme in my writings. As business leaders rush to adopt new cloud applications security needs to partner much more strategically. The way that security classifies and treats data has to align to business and usage contexts. It’s protecting data, transactions and workstreams versus focusing only on building secure and compliant infrastructures that will help organizations win and retain customer trust in the long run.

By Evelyn de Souza

Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
Gary Bernstein
Common DevOps Misconceptions 86% of businesses say it’s important for their company to develop and produce new software fast to win market share and beat the competition, Harvard Business Review reveals. Yet, just 10% of businesses ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Mark Banfield
Implement A Seamless Customer Experience The need for digital interaction has never seemed more critical than it does today. As the coronavirus continues to spread, citizens around the world are being asked to hunker down ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
The Backup.png
Growing Up.png
The Report.png
It’s Magic

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.