Do You Know Where Your Data Is? Probably Not
Not to give away my age, but do you remember the nursery rhyme, ‘Oh where, oh where has my little dog gone? Oh where, oh where can he be?’ Well, if we apply this to organizations’ data, most have no idea where their data is. Could be a problem, if you have any concerns about data breaches, would like to perform analytics, or are knowingly in violation of the General Data Protection Regulation (GDPR) or, heaven forbid, the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
This graphic tells the story and it isn’t a pretty one. These statistics are taken from the fifth annual Data Security Confidence Index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. What I find somewhat odd is that 89 percent of organizations would like to analyze their data to gain competitive advantages. Folks, there is no magic bullet.
It should be a primary concern that internal or external actors can find and manipulate data – and be profitable at it. The General Data Protection Regulation (GDPR) has brought consumer protection to the fore, but most companies still struggle with compliance. Another concern, not usually mentioned, is that of data manipulation, which can take years to discover and can dramatically change business strategy, brand or even product development. Many hackers spend years prowling around data until the time is right to exploit it.
One more statistic, and then I will stop. This one totally befuddles me. “Once the hackers are inside, 43 percent of companies are extremely confident that their data would be secure.” Data that companies don’t know how to find? What am I missing?
Luckily, there are software solutions available now that will find your data for you. Some are simple, some quite complicated. Our tool, the conceptClassifier platform will tag and classify all your data, regardless of where it resides. This also provides a tremendous – yes, tremendous – opportunity to clean up all the garbage data you have been keeping for years, ‘just in case’ you may need it. What is unique is that it will also find related items that share the same meaning, but when the search terms are different.
It also enables you to create your own rules – even business people can use it, it’s that easy. This is useful for sensitive information that may not be protected – think Tesla. Since the technology generates topics, subjects, and concepts, multi-term rules can be used. It runs in real-time and data can be moved to a secure repository or an email can be generated to alert the appropriate staff for remediation.
Do you know where your data is? Let me know, I am very interested.
If you would like to tackle your security metadata problems, our technology is still unique in the industry, with its ability to discover, tag, classify, and remediate security vulnerabilities, by generating and applying multi-term security metadata. Want a third-party opinion? Read more about us in this file analytics report by an independent research firm.