Addressing Security, Quality and Governance of Big Data

Addressing Data Quality

Big Data is quickly being recognized as a valuable influencer of business strategy, able to improve productivity, streamline business processes, and reduce costs. However, not all data holds the same value and organizations need to take care to address the quality of the data they’re exploiting, while carefully managing security and governance concerns.

Data Quality

Blindly trusting business reports to be based on sound and quality information can lead not only to embarrassment but also business decline should the foundational data be found lacking. For this reason ensuring the data your organization employs in its analytics and reporting is of both relevant and high quality is of the utmost importance. While only using high-quality data is a sound principle, it is a case more easily said than done. Understanding where data originated, who has control and accountability for it, and precisely what the quality standards of your organization’s data should be, are significant tasks that must be undertaken. Moreover, while software exists which helps with data correction and error analysis, such tools only address part of the problem. To best meet the challenge of ensuring high-quality data, businesses need to implement a plan that helps identify quality issues, chase down the causes, and create problem resolution strategies.

Carol Newcomb, Senior Data Management Consultant at SAS, suggests a sustainable plan for managing data quality, warning that the process is not likely to be simple and including many steps such as the implementation of rules for collecting or creating data, data standardization and summarization rules, data integration rules with other sources of data, and hierarchy management.

Newcomb asserts that an effective, sustainable data quality plan should include the following five elements:

  • Elevate the visibility and importance of data quality.
  • Formalize decision making through a data governance program.
  • Document the data quality issues, business rules, standards and policies for data correction.
  • Clarify accountability for data quality.
  • Applaud your successes.

Considering reports from Gartner analysts that by 2017, one-third of the world’s largest companies will experience information crises due to an inability to adequately value, govern and trust their enterprise information, it’s crucial that businesses put data quality programs in place.

Data Regulations, Security & Privacy

The ITRC’s latest Data Breach Report points to 500 data breaches in the first half this year with more than 12 million records compromised. Such breaches expose Social Security numbers, medical records, financial information and more, putting individuals at risk. It’s no wonder privacy is such a concern as the mountains of data increase exponentially day by day. Though the ability to track customers and predict future behaviors is of great benefit to many companies, it’s a trade-off for most consumers as privacy is eclipsed by the convenience and assistance that data analysis and prediction provides. And although organizations such as Google promise data anonymization, it’s impossible to know how carefully our privacy is guarded, while the increasing popularity of the Internet of Things means our engagement with the internet and data collection is only escalating.

This extensive data does offer many noble assistance’s, not least of all patient monitoring for superior and prompt medical care, and real-time data utilization in classrooms ensuring education systems are functioning efficiently. And so perhaps data governance and regulation can help mitigate the risks without abandoning the rewards. States Scott Koegler of Big Data Forum, “Pulling actionable but protected data is key to developing advanced business practices while protecting customer identity.” A ‘Zero Trust Data’ policy is a potential solution wherein access to data is denied by default and always requires verification. In this way, data is made available to those legitimately requesting it, but information is correctly de-identified.

By designing efficient data management policies and properly adhering to regulations, companies are able to reap the benefits of Big Data without infringing on the privacy and security of individuals’ data. Furthermore, applying quality control systems to data collection and management enhances the value businesses draw from their data without needlessly breaching confidentiality. Ultimately, the time expended in data security, quality, and governance benefits the businesses who use it as well as the individuals and communities to whom it relates.

Article sponsored by SAS Software and Big Data Forum

By Jennifer Klostermann

David Loo
The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
James Corbishly
Teams Sprawl in the Remote Workspace As working from home has become the new everyday norm, with more employers embracing the remote-work model as a new and likely permanent fixture of the employment world, there ...
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.