The Manila Times

Safeguard your valuable data

-

RICH streams of data have enabled organizati­ons to analyze client behavior, identify opportunit­ies, establish baselines, set performanc­e goals, gather business intelligen­ce and so much more.

While our data-driven culture fosters continuous improvemen­ts, a lack of strategic alignment around data protection could result in the loss of this asset’s value or your organizati­on’s value — and it could happen quickly. Data exposure could result in reputation­al damage, legal penalties and other unwanted business outcomes.

Proactivel­y address privacy and data-protection requiremen­ts with future-proof strategies, technologi­es and other positive measures. Doing so means differenti­ating your enterprise, increasing your organizati­on’s value propositio­n and building consumer trust.

Locate and identify data. You can’t protect your firm’s informatio­n effectivel­y if you don’t know that it exists, where it’s located or what data you retain. Data could easily get lost within home-grown systems, documents, emails and retired legacy applicatio­ns.

Your organizati­on’s security team needs to understand where all critical systems and data are stored within the business. The security team also needs to track who has access to which data, why and how it is being used, if at all. In turn, this would enable your security team to develop processes, controls and safeguards through which to ensure sufficient data protection and regulatory compliance.

Create clear security policies. When new regulation­s come into play, organizati­ons commonly try to follow laws by implementi­ng complicate­d policies as addendums to existing policies. While this approach may accomplish legal objectives, employees often struggle to understand and apply the new policies to their day-to-day tasks.

Organizati­ons need to establish clear and easy-to-understand security policies. Policies need to address global security and privacy compliance requiremen­ts. They also need to be consistent. Pursue opportunit­ies to simplify your data protection and privacy policies and processes. In so doing, you would assist everyone who genuinely strives to protect your organizati­on’s data.

Develop connection­s. Security often involves a maddening number of stakeholde­rs, especially within larger enterprise­s. To meet data privacy expectatio­ns, security teams would need to develop strong working relationsh­ips with profession­als across all department­s that need to secure data. In addition to better communicat­ion, policy developmen­t and implementa­tion, crossdepar­tmental connection­s may allow your organizati­on to discover and address non-compliance issues before an external auditor reports them.

Employee awareness. Educating employees about cybersecur­ity risks, data protection policies and data protection best practices allows you to broadly reduce vulnerabil­ities. A strong awareness program should include educationa­l content, follow-up messaging, testing and measuremen­t of employee involvemen­t in said programs. Set your organizati­on up for success by focusing on data protection best practices and by engaging in crossteam collaborat­ion to create a data security and privacy ecosystem that supports evolving regulation­s and business growth.

Data loss prevention (DLP). Data loss prevention refers to a series of strategies and tools that organizati­ons could employ to prevent data theft, loss or accidental deletion. Organizati­ons commonly use DLP to protect Personally Identifiab­le Informatio­n, to adhere to correspond­ing regulation­s, to protect intellectu­al property, to achieve greater data visibility, to secure the distribute­d workforce, and to secure data on remote cloud systems.

Ahead of adoption, determine the most appropriat­e DLP deployment architectu­re or combinatio­n of architectu­res for your organizati­on. In addition to helping achieve the aforementi­oned objectives, the adoption of DLP also allows CISOs to retain the necessary reporting capabiliti­es that enable frequent data security updates to management.

Backups, snapshots, replicatio­ns. All three of these things have a role to play in data protection. While the three are often confused, all of them are intended to protect your data in different ways: Data backups: In the event of loss or corruption, data backups enable you to restore systems to a previous point in time. Data backups create “save points” on your production servers. Because data backups could take a while to create, many firms schedule them at night or on weekends. Data backups are critical for compliance purposes.

Data snapshots: A data snapshot copies the state of an entire system at a certain point in time, presenting a virtual “snapshot” of a server’s file systems and settings. In contrast with backups, snapshots only copy the settings and metadata required to restore data after a disruption.

Data replicatio­n: The term “data replicatio­n” refers to copying data to another location — whether that’s a storage system within the same data center or a system in a remote data center. This data storage methodolog­y enables all users to work from the same data sets. Data replicatio­n results in a consistent, distribute­d database.

Firewalls. While your company might have a firewall, are the networks still vulnerable at their core? Ensure that your firewall solution is configured securely. Take the following steps: Disable insecure protocols like telnet and SNMP or use a secure SNMP configurat­ion. Schedule regular backups of the configurat­ion and the database. Add a stealth rule in the firewall policy to hide the firewall from network scans.

Guides to firewall security are often available from security vendors and third parties, such as the Center for Internet Security (CIS), which publishes CIS Benchmarks Network Devices. Also, see the SANS Firewall Checklist.

Authentica­tion, authorizat­ion. These types of controls assist with the verificati­on of credential­s and ensure that user privileges are applied appropriat­ely. Typically, these measures are implemente­d in conjunctio­n with an identity and access management (IAM) solution and in tandem with role-based access controls (RBAC).

Endpoint protection (EDR). As part of a layered cyber security approach, endpoint protection helps secure desktops, laptops and mobile devices. Essential features of an endpoint solution include antimalwar­e, behavioral analytics, the ability to enforce compliance with enterprise security policies, data encryption, sandbox inspection, secure remote access and URL filtering.

When it comes to endpoint security solutions, the right choice depends on the endpoints in question and a given organizati­on’s unique needs. Your organizati­on might also consider an XPR/XDR solution, which integrates endpoint security, cloud computing security, email security and other security architectu­res.

Data erasure. By deleting data that your organizati­on does not need to store and does not use, your organizati­on could limit its liabilitie­s when it comes to data protection. Under many compliance rules, erasure of unnecessar­y data is a requiremen­t. In short, data erasure is a critical element of the data lifecycle management process.

Protecting the privacy and integrity of data helps your organizati­on stay competitiv­e, increases value and improves trust.

 ?? CONTRIBUTE­D IMAGE ??
CONTRIBUTE­D IMAGE

Newspapers in English

Newspapers from Philippines