Data security is essential for businesses to face the challenges that 2020 has already presented and will surely deepen in 2021.
Many of today's data security models were built on the assumption that data would always be in a data center and consumed on-premises. This security model assumes that data is few, constantly monitored, and generally at rest. It also assumes that remote employees access it by logging into the corporate network using all appropriate security controls.
Today, the reality is different: the volume of data has grown exponentially, and it increasingly comes from cloud applications and is sent to mobile devices in the pockets of employees and customers. The need to implement effective data management is essential, which in turn means that the security model must be updated to meet the new circumstances.
Not to mention the scenario that arose in response to the Covid-19 pandemic, where companies had to adapt their work environments to almost 100% remote. Consultations and office 365 database were also digitized; for example, banks saw an adoption of their digital channels in the first month of the pandemic comparable to the last 3 years. This makes data security much more vulnerable and businesses must have a clear action plan to avoid any risk.
You may be interested in reading:
Covid-19, home office and data security in the digital age
Data-Centric Security
Data-centric security recognizes the value and importance that data has acquired in the organization. It seeks to protect the data itself, rather than just the points, networks, and applications in which it moves. This means that security moves with the data so that data can move as much as the organization needs it to. Therefore, rather than holding back progress and inhibiting data proliferation, security can help the organization make the most of its data, wherever it is stored and wherever it goes. To adopt this new model of data-centric security, companies have to:
1. Identify where sensitive data resides
Only 16% of organizations know where their sensitive data resides. The ability to connect, discover, locate, and classify sensitive data is a critical process. And it must be set up to be repeatable and agnostic of technology or geography.
2. Evaluate current security
Not all data is created equal. That's why you need to determine the level of risk that sensitive or confidential data is subject to. This means always knowing who has access to the data, what is being done with it, and what type of security controls are in place to protect it.
Data security in the Data 4.0 era
-
- Posts: 1115
- Joined: Tue Dec 24, 2024 4:29 am