February 13, 2017

Why ‘Data Hoarding’ Increases Cybersecurity Risk

By Ankur Laroia

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most businesses have is unstructured. A general lack of understanding of […]

Data Hoarding

The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most businesses have is unstructured. A general lack of understanding of how to manage the data and a reluctance to delete content, leads to ‘data hoarding’ and businesses seem unaware of what data is present and what value it holds. There is also confusion regarding management and governance.

Scattered content, regardless of where it is stored, poses a major security risk. Most businesses are unaware which data set is sensitive and will likely not have adequate measures in place to secure it against cyberattacks. Any security technology that is implemented to keep data secure cannot be effective unless it is clear what data is of value. For this reason, document classification must dovetail with security processes to identify, record, and potentially encrypt content in order to keep it safe both within and outside the firewall.

Unless companies embrace the power of open thinking and a new pragmatic approach to security, data breaches are going to become the “new normal”, leaving companies to deal with the inevitable fall-out and impact on brand reputation. Every business is now contending with the interplay between making information instantly accessible to a range of users and keeping it secure against malicious attacks.

Information stewardship is the key to maintaining a hold on the burgeoning data in today’s digital age, using individual business insights to inform decisions to implement processes that streamline the flow of data and improve user experience. Content must be correctly identified, categorised and deleted (where appropriate) to keep the problem of data proliferation from spiraling out of control. These decisions must be made by agreements between both high level executives and IT departments. Information stewardship cannot be solely the responsibility of either, and should instead be a cohesive approach. A successful breach could have lasting financial and reputational ramifications and so this internal collaborative approach has to be a priority and shared responsibility.

When identifying a solution to the problem of data hoarding, businesses must also keep the end users in mind and implement processes that allow them to access the content they need, when they need it, to ensure a smooth workflow. The solution must also allow collaboration to facilitate innovation and improve efficiency. Putting users’ requirements at the centre of the process ensures the best compliance with processes. In turn this streamlines and secures data.

To address the challenges that businesses face, an enterprise grade platform is needed rather than a product that has been fitted for use, to at once provide agility but must be constantly updated. Platforms that are open source, with thousands of “white hats” who can help fight the “black hats,” will help companies secure their most precious resource – intellectual property. Transparent, open systems by their very nature are hardened to prevent future breaches. For every new encryption or password management point solution enterprises put in place, there are likely hundreds of hackers (many from state actors) figuring out a way to compromise those security countermeasures. Enterprises need more brainpower to stay one step ahead; otherwise, they are just going to experience these breaches over and over again.

The deluge of data shows no signs of abating. Managing and extracting intelligence from data that is growing in silos will remain a challenge – not only will this information decrease in value, it will hamper decision making and increase in risk. Embracing open thinking and information stewardship will enable content to be identified, classified, curated, and governed throughout its lifecycle. Thus promoting business agility, better decision making and reducing the risks of data hoarding.

By Ankur Laroia

Ankur Laroia

Lambda Cold Starts: What They Are and How to Fix Them

What Are Lambda Cold Starts? Lambda cold starts occur when AWS Lambda has to initialize [...]
Read more

Exploring SaaS Directories: The Path to Optimal Software Selection

Exploring the Landscape of SaaS Directories SaaS directories are vital in today’s digital age, serving [...]
Read more

A.I. is Not All It’s Cracked Up to Be…At Least Not Yet!

Exploring AI’s Potential: The Gap Between Aspiration and Reality Recently Samsung releases its new Galaxy [...]
Read more

5 Azure Cost Management Strategies

What Is Azure Cost Management? Azure cost management refers to the practices and processes that [...]
Read more
Steve Prentice

Get Smarter – The Era of Microlearning 

The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more

SPONSORS

Interviews and Thought Leadership

Daniel Barber

Q&A Daniel Barber – 2024 AI + Data Privacy Predictions

2024 AI + Data Privacy Predictions In a recent interview with CloudTweaks, Daniel Barber, Co-Founder and CEO of DataGrail, shared insightful perspectives on the evolving landscape of AI and privacy. [...]
Read more
Michael Kleef

Akamai’s Michael Kleef Reveals Key Shifts in Cloud Computing Landscape

Welcome to a conversation with Michael Kleef, Vice President of Product Marketing, Developer Advocacy, and Competitive Intelligence at Akamai Technologies. Today, we’re privileged to have him share his insights with [...]
Read more

CrowdStrike and Dell unleash an AI-powered, unified security vision

Dell and CrowdStrike are joining forces today to help businesses battle against cyberattacks using AI to protect against generative AI, stealth social engineering and [...]
Read more

Top Cloud Cost Optimization Strategies for Multi-Cloud Environments

The age-old saying “Don’t put all your eggs in one basket” has found a new resonance in today’s cloud landscape. [...]
Read more

Embracing Governance to Navigate 2024’s Tech Trends

Mastering Governance Strategies for Success The start of a new year is a fitting time for goal-setting, and IT managers [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.