Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected and stored, what is happening with the data and where it is ultimately going? How do we build security around critical assets that we need to protect but don’t always have visibility into?

From Index Cards to Instant Availability

It’s remarkable how many different ways our organizations collect, manage and protect valuable data. I was reminded of this on a recent flight where I had the great fortune to sit next to a gentleman who spent much of his career helping credit organizations transition from local, independently operated agencies to the global credit bureaus we have today.

It was interesting to hear how credit scores were determined up until just a few decades ago. To assess someone’s creditworthiness, a lender would call a local credit agency, where handwritten index cards were maintained for the individuals within that community. These cards contained a wide range of personal information — everything that was deemed relevant to whether the individual had the ability to repay a loan. Each office used its own discretion to determine what information was collected and how it was used.

Over the years, regulations have standardized the type of information that can be collected, limited how long it can be retained, and given consumers unprecedented access to their personal information and credit scores. It has been a remarkable transformation. It’s also similar to ones many of our businesses have gone through, where modern IT and networking have allowed us to better manage our data and make it instantly available whenever and wherever needed.

Not surprisingly, these same technologies can be exploited in ways we’ve never imagined. As I continued my travels, I couldn’t stop thinking about how we collect and manage the many different types of data in our organizations and how it affects all of us.

The Need for Comprehensive Data Security

Managing sensitive data is a big responsibility that we all share. At some point, we may stop and think about how much simpler it would be to identify and secure our data if we locked it all in a filing cabinet in the back office. If we reverted back to such archaic record keeping methods, however, we would never be able to accomplish what we do today as businesses or as a society.

We need to find a way to better manage the volumes of sensitive data contained within our organizations. There is the data we know we have that we strive to rigorously manage and protect. But the bigger risk is the data we don’t even know exists. Sure, we can identify and protect the data we know about, but what about that list of sensitive customer information that someone in sales pulled together and stored on a laptop? Or that spreadsheet someone in finance created and shared with his or her colleagues? Or the engineering team’s proprietary designs, which are captured across many documents and systems?

In some ways, it is similar to the handwritten cards that used to determine credit scores, but without the organization or physical security of the locked filing cabinet. Let’s face it: Sensitive data is everywhere, even in areas that are often left unprotected.

The Power of Full Visibility

Data security starts with knowing what information exists and where it is located. Next, make sure you take the right precautions to secure and manage the data to prevent unauthorized access. The final step is to detect any movement of this data and establish visibility into who accessed it and what was done with it.

Unless somebody has physical access, odds are they are accessing, downloading or even exfiltrating this data over one of your networks. The network is where you can gain visibility into this data to assess what is being done with it. This works just as well for the data you don’t know about. Comprehensive visibility into your data empowers you to understand and better manage what you have, and to quickly detect and respond to unauthorized access and potential misuse.

This is the level of visibility we need across our networks, but how do we get it? Traditional means will only go so far, and this goes well beyond deep packet inspection. It requires full content analysis of network packet payloads with application-level context applied to gain visibility into the critical data we need to know about and protect.

Read the report: QRadar Network Insights Delivers Real-time Insights Like Nothing Else

More from Data Protection

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today