The past few months have been full of news coverage around data breaches and the need for data awareness. From hospitals to universities to children’s toys, data attacks are coming full force, and IT pros …
2 Steps to secure sensitive data
Did you know…
- According to Forrester Research, more than 60 percent of enterprises will discover a breach of sensitive data?
- The average cost of a single lost or stolen record containing sensitive information costs $158?
- At least 75 percent of all data breaches exposing sensitive information are caused by employee carelessness or malicious behavior?
The numbers are scary. As cybercriminals become more sophisticated, so do their tools, increasing the likelihood that an organization will be victim to an attack at one point or another. Take ransomware – the talk of the town (in the security world) – for example. It has no boundaries and discriminates against no one – even the smallest of small businesses.
In this ever-changing security landscape, why aren’t IT teams prepared for the worst? What may seem like a small security breach can end up costing a company thousands of dollars, irreparable reputational damage and customers’ personal lives (do you remember the 2013 Target breach?). It’s about time organizations take their customers’, employees’, friends’ and family’s data security seriously.
What if I told you there are two simple steps to better defend sensitive data?
Step 1: Identify sensitive data.
Be a detective and examine your data. Getting an up-close-and-personal look can help organizations identify where the most sensitive information lives and tag it appropriately.
Ask questions like:
- Is the data stale? When was the last time it was used?
- Where does the data currently reside? Where should it be housed?
- Who has access to it?
After all, if you don’t know what’s in your data, how can you protect it?
Step 2: Track user access.
Knowing who has access to the data is key for tracking and identifying anomalous behaviors. If you can identify what data is being accessed thanks to the tagging from step 1, you can better assess risk and respond to suspicious activity. Be sure to keep a record of data access and analyze it on a regular basis to keep your most sensitive information out of the wrong hands.
Learn how Jungle Jim’s uses DataGravity for Virtualization to better secure customers’ sensitive data.Like This