November 25, 2015 By Leslie Wiggins 3 min read

The adoption of big data analytics is rapidly growing. If you don’t get ahead of the curve, there’s big potential for big problems; but if you do plan ahead, there are big opportunities to successfully enable the business.

You might be wondering what the big deal is — and what makes big data special and more challenging. The trouble is that big data analytics platforms are fueled by huge volumes of often sensitive customer, product, partner, patient and other data — which usually have insufficient data security and represent low-hanging fruit for cybercriminals.

A Closer Look at Big Data Challenges

Big data analytics create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example:

  • Big data analytics focuses on finding key insights to move the business forward. Those insights are generally derived from sensitive data that’s aggregated in the big data repository.
  • The nature of big data — high volume, variety and velocity — makes it difficult to ensure data integrity.
  • Schema-less distributed environments, where data from multiple sources can be joined and aggregated in arbitrary ways, make it challenging to establish access controls.
  • Big data repositories present another data source to secure, and most existing data protection and compliance approaches will not scale.

Big Data Security Has Big Implications

Big data environments allow organizations to aggregate more and more data, largely consisting of financial, personal, intellectual property, proprietary or otherwise sensitive data. Most of this data is subject to compliance regulations such as the Sarbanes–Oxley Act (Sarbox), the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), the Federal Information Security Management Act (FISMA) and the EU Data Privacy Directive.

This data is a primary target for hackers. Data security professionals need to take an active role as soon as possible. The reality is that pressure to make quick business decisions can result in security professionals being left out of key decisions or being seen as inhibitors of business growth. However, the risk of lax data protection is well known and documented, and it’s possible to be an enabler rather than an obstacle.

Corporations and their officers may face fines from $5,000 to $1,000,000 per day and possible jail time if data is misused. According to the “2015 Cost of Data Breach Study” conducted by the Ponemon Institute, the average organizational cost of a data breach is $3.8 million. In this year’s global study, the average per capita cost of data breach increased from $145 to $154. Hard penalties are only one example of how organizations can be harmed; other negative impacts resulting from a data breach include share-price erosion and negative publicity resulting in irreparable brand damage.

No Opportunities Without Security

At this time, an increasing number of businesses are adopting big data environments. The time is ripe to make sure security teams are included in these decisions and deployments, particularly since big data environments — which don’t include comprehensive data protection capabilities — represent low-hanging fruit for hackers since they hold so much potentially valuable sensitive data.

Data security is a detailed, continuous responsibility that needs to become part of business as usual for big data environments. Securing data requires a holistic approach to protect organizations from a complex threat landscape across diverse systems.

Data security must complement other security measures such as endpoint security, network security, application security, physical site security and more to create an in-depth approach. By planning ahead and being prepared for the introduction of big data analytics in your organization, you will be able to help your organization meet its objectives securely.

Read the white paper: Finding the path to security in the big data landscape

More from Data Protection

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today