5 Data security tips every IT manager should know

The past few months have been full of news coverage around data breaches and the need for data awareness. From hospitals to universities to children’s toys, data attacks are coming full force, and IT pros …

3 Questions answered by the Verizon Data Breach Report

Verizon’s annual Data Breach Investigations Report has become a hallmark of the security industry’s progress, as well as its preparedness against attackers and breach incidents. This year’s theme is, “Security should be a driving force, …


Great product teams play bingo, not basketball

I totally admit that I drive product folks crazy. I am a huge believer that it is the responsibility of every person in a company to help ensure complexity and gratuitous innovation don’t creep into …

2 Steps to secure sensitive data

Did you know…

  • According to Forrester Research, more than 60 percent of enterprises will discover a breach of sensitive data?
  • The average cost of a single lost or stolen record containing sensitive information costs $158?
  • At least 75 percent of all data breaches exposing sensitive information are caused by employee carelessness or malicious behavior?

The numbers are scary. As cybercriminals become more sophisticated, so do their tools, increasing the likelihood that an organization will be victim to an attack at one point or another. Take ransomware – the talk of the town (in the security world) – for example. It has no boundaries and discriminates against no one – even the smallest of small businesses.

In this ever-changing security landscape, why aren’t IT teams prepared for the worst? What may seem like a small security breach can end up costing a company thousands of dollars, irreparable reputational damage and customers’ personal lives (do you remember the 2013 Target breach?). It’s about time organizations take their customers’, employees’, friends’ and family’s data security seriously.

What if I told you there are two simple steps to better defend sensitive data?

Step 1: Identify sensitive data.

Be a detective and examine your data. Getting an up-close-and-personal look can help organizations identify where the most sensitive information lives and tag it appropriately.

Ask questions like:

After all, if you don’t know what’s in your data, how can you protect it?

Step 2: Track user access.

Knowing who has access to the data is key for tracking and identifying anomalous behaviors. If you can identify what data is being accessed thanks to the tagging from step 1, you can better assess risk and respond to suspicious activity. Be sure to keep a record of data access and analyze it on a regular basis to keep your most sensitive information out of the wrong hands.

Learn how Jungle Jim’s uses DataGravity for Virtualization to better secure customers’ sensitive data.

  Like This

David Siles

David is Chief Technology Officer for DataGravity. Prior to becoming CTO, David served as vice president of worldwide field operations at DataGravity. Previously, he was a member of the senior leadership team at Veeam Software. He also served as CTO and VP of professional services for systems integrator Hipskind TSG. A graduate of DeVry University, he is a frequent speaker at top tier technology shows and a recognized expert in virtualization.