Your Data Has Left the Building: Are You Protecting It?

3 minute read
Your Data Has Left the Building: Are You Protecting it?

Security breaches are inevitable. Companies should shift from aging mindsets and predictable tools to comprehensive prevention, detection and response capabilities in order to neutralize potential damage.

In this three-part series, we’re exploring today’s IT security issues from different perspectives:

1. Core infrastructure security and threat and vulnerability management
2. Data protection and identity and access management
3. Security program governance and application security

Part Two: Your Data Has Left the Building—Are You Protecting It?

In part one of this series, we discussed the current role of perimeter and core infrastructure security, and the importance of keeping up your organization’s first line of defense.

Now, let’s turn our focus to protecting “the crown jewels,” using data protection and identity and access management. As we all know, valuable information increasingly resides outside of the data center, beyond IT’s control. A lot of it exists on the “edge” of the network, where data is captured and work is conducted on endpoints like laptops, smartphones, and tablets. Not only do we have to find a way to protect it, we want our employees to be able to retrieve it on the go, and we also need to produce it for compliance reasons.

Meeting all of these needs can be hard to achieve, but doing so delivers value to your business and is critical to protecting your data, your intellectual property and your brand.

The first step to securing data—no matter where it is—is knowing what you need to protect. You have to understand what matters to your business, and what’s mission critical so you can defend it with everything you have.

Companies that don’t have an effective data classification and/or prioritization program in place struggle with data protection because they don’t know what to focus on.

You can’t protect what you don’t know

It is critical to separate valuable information that may be targeted from less valuable information by tracking data usage cycles and implementing appropriate controls. Take into account:

  • Where this information is stored. Make sure you include mobile devices, backup systems, and cloud services.

  • Who has access to it; understand which employee roles and individuals need access, as well as those that may have unwarranted access.

  • What your organization’s process is for provisioning and deprovisioning access.

  • Your partners’ valuable information and what your process is for evaluating their security.

Unless you have a tremendous amount of staff and operational support, you probably can’t do it alone. Professional assessments can help you identify and classify sensitive data, figure out who has access to it, and give you the baseline insight you need to update security policies and processes.

From a technology perspective, solutions like DLP, encryption, advanced endpoint protection, database activity monitoring, and enterprise mobility management tools help to guard against threats no matter where data is stored, used or transmitted. And if encryption is well-implemented, it can make data useless to attackers in the event of a breach.

Identity and access management tools (federated identity/SSO, privileged access management and identity governance solutions) and strong authentication help by controlling access to services, and managing the identities and privileges of expanding groups of users—including employees, partners, and customers—that are logging into systems both inside and outside the enterprise.

By using data protection and identity and access management tools together, you can help your organization protect data throughout its lifecycle, and secure each door into the fragmented IT environment.

You Might Also Like
Join our Newsletter

Stay up to date with the latest and greatest from our monthly newsletter

About the Authors
Popular Today