October 22, 2015 By Leslie Wiggins 4 min read

You might be wondering why securing big data is a big deal. After all, big data is just normal data, right?

Big data is indeed just data, but there are some key differences. Big data is just that — really big. There are really large quantities of it, a wide variety of data types are covered by the term and the speed at which it arrives and flows through any given environment is unique. To this end, any organization deploying a big data analytics platform needs to be prepared. The enterprise also must have thought through the different data security requirements that this will place on the traditional data landscape.

Leadership Turns Its Attention to Big Data Security

In most cases today, business leaders haven’t yet stopped to think about the security implications involved in big data analytics. But by getting ahead of this issue, you can become the power behind the throne and enable business success and growth.

The big data analytics conversation has been taking place for several years at the business level, within marketing and strategy teams as well as the IT organization. On the business side, big data analytics gripped employees’ imaginations, and teams understood how it could help take huge volumes of data from different sources and analyze it rapidly. This allowed businesses to track disease patterns, understand customer buying patterns or even uncover possible tax fraud.

On the flip side of the coin, IT has long seen the potential benefits of adopting analytics platforms such as Hadoop or NoSQL. The potential cost savings for storage alone are huge.

Businesses have spent the last few years vetting different big data platforms, putting them into nonproduction, working out the kinks and then pushing them into production. The adoption cycle has taken a while. However, it’s safe to say that big data analytics is here to stay. This brings us to the next point: Big data projects are fueled and powered by sensitive data — patient information, customer data, personally identifiable information (PII), etc.

Read the complete e-book: Top tips for securing big data environments

Are You Prepared for the Worst?

This is what makes big data, and the big insights it has the power to reveal, a potential big exposure. It’s time for security teams to take a close look at what their business counterparts are doing or are planning to do in the big data analytics arena so they can start to prepare — particularly when you take the following into account:

With the right level of planning, security teams can do a lot to enable the business to safely leverage big data analytics and all the benefits it has to offer. In some ways, securing big data carries the same risks as securing regular data: There are compliance requirements that must be met, potential costs of data breaches to consider and a brand reputation at stake.

Yet big data analytics also introduces new challenges: There are new users accessing, manipulating and possibly sharing the sensitive data fueling the platform. Given the nature of the data flowing through big data analytics platforms, this creates a particularly juicy target for cybercriminals. The target is also often low-hanging fruit because big data platforms don’t typically provide much in the way of comprehensive or sophisticated security capabilities.

Big Data Can Be Secured

But don’t lose heart! There is a way to plan for and successfully secure big data. As with any security initiative, the first important thing to recognize is that big data platforms don’t exist in a vacuum; they are or will soon become part of an integrated environment. You need to think of how to secure the data sources that will feed the big data platform, as well as how to protect the sources and the data itself. You need to assess vulnerabilities among your various data repositories to harden that part of your environment.

You also need to be able to monitor data activity across the sources, the big data platform and users. The platform should support real-time alerts or even block access in real time if suspicious behavior occurs. And last but not least, you need to make sure your big data security approach is consistent and integrated with the approach you use across the rest of your enterprise. If it’s not, you provide the bad guys a loophole they might be able to exploit.

By planning ahead and being prepared for the introduction of big data analytics in your organization, you can become the power behind the business throne. You’ll be able to help the business meet its objectives — securely.

To learn more download the e-book: Top tips for securing big data environments

More from Data Protection

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today