How To Overcome Data Insecurity Online

Data Insecurity In The Cloud

Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest to who has access to your data in the public cloud models you use and most importantly that your customer’s data has not been tampered with, corrupted, or leaked?

The New Data Economy

We are moving towards a data economy, where data is a core component of the value of the service or product that is delivered to the customer. In our hyper-connected world data streams are becoming far more personal and intimate than previously. Consider a connected bathroom scale where weight loss or gain patterns might be transmitted from a scale to a backend cloud and where as part of the product, customers have the ability to study their weight patterns over periods of time.

Despite a widespread recognition in the industry of the value and importance of customer data, we live in a perpetual state of data insecurity. It’s not only about the high profile data breaches but it’s also about minimizing accidental risk vectors. In the cloud well intentioned employees who don’t consider the ramifications of oversharing on social media sites, or who accidentally drag and drop sensitive documents from their desktops into email or who upload regulated data into insecure file shares to avoid corporate security measures may be your organization’s biggest risk vector.

Internal Data Marketplace

At the CloudExpo Asia conference last week I referred to the sliver lining in the data insecurity issue. The effects of data loss, misuse and leakage are driving a very necessary change across the business landscape and executives are beginning to get educated on data security issues.

Following are three key steps I recommend to executives as they look to beef up their data security programs with a lens on public cloud

1. Build an internal data marketplace: Organizations need to know the value of their data in order to make the right decisions about whether to host or transact their data in a particular cloud model, and thereafter how to protect it. To calculate the value of data, build an internal marketplace with user entitlements and access controls mapped accordingly. This encourages business users to treat data as part of the business P&L.

2. Learn from your data insecurity history: Organizations have a tendency to want to bury the past especially when it hasn’t been stellar. However, knowing how data has been used and abused in the past is an indicator of how it might be compromised and disclosed in the future. Studying loss trends over time can help organizations forecast future losses and improve prevention and mitigation strategies.

3. Make data protection business-consumable: This is a recurring theme in my writings. As business leaders rush to adopt new cloud applications security needs to partner much more strategically. The way that security classifies and treats data has to align to business and usage contexts. It’s protecting data, transactions and workstreams versus focusing only on building secure and compliant infrastructures that will help organizations win and retain customer trust in the long run.

By Evelyn de Souza

Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...
Alex Tkatch
Best Practices for Designing and Executing a Product Launch Nothing in entrepreneurial life is more exciting, frustrating, time-consuming and uncertain than launching a new product. Creating something new and different can be exhilarating, assuming everything ...
Oxylabs
A conversation with Aleksandras Šulženko – Product owner at Oxylabs.io In a global economy where change happens by the second, one of the best ways to keep up with industry information, including your competitors, is ...
JK Chelladurai
Maintain telecom tax compliance The Telecommunications industry is one of the most heavily taxed service industries. In countries such as the United States, providers have to keep on top of Federal, State, and District taxes, ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.