November 25, 2015 By Leslie Wiggins 3 min read

The adoption of big data analytics is rapidly growing. If you don’t get ahead of the curve, there’s big potential for big problems; but if you do plan ahead, there are big opportunities to successfully enable the business.

You might be wondering what the big deal is — and what makes big data special and more challenging. The trouble is that big data analytics platforms are fueled by huge volumes of often sensitive customer, product, partner, patient and other data — which usually have insufficient data security and represent low-hanging fruit for cybercriminals.

A Closer Look at Big Data Challenges

Big data analytics create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example:

  • Big data analytics focuses on finding key insights to move the business forward. Those insights are generally derived from sensitive data that’s aggregated in the big data repository.
  • The nature of big data — high volume, variety and velocity — makes it difficult to ensure data integrity.
  • Schema-less distributed environments, where data from multiple sources can be joined and aggregated in arbitrary ways, make it challenging to establish access controls.
  • Big data repositories present another data source to secure, and most existing data protection and compliance approaches will not scale.

Big Data Security Has Big Implications

Big data environments allow organizations to aggregate more and more data, largely consisting of financial, personal, intellectual property, proprietary or otherwise sensitive data. Most of this data is subject to compliance regulations such as the Sarbanes–Oxley Act (Sarbox), the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), the Federal Information Security Management Act (FISMA) and the EU Data Privacy Directive.

This data is a primary target for hackers. Data security professionals need to take an active role as soon as possible. The reality is that pressure to make quick business decisions can result in security professionals being left out of key decisions or being seen as inhibitors of business growth. However, the risk of lax data protection is well known and documented, and it’s possible to be an enabler rather than an obstacle.

Corporations and their officers may face fines from $5,000 to $1,000,000 per day and possible jail time if data is misused. According to the “2015 Cost of Data Breach Study” conducted by the Ponemon Institute, the average organizational cost of a data breach is $3.8 million. In this year’s global study, the average per capita cost of data breach increased from $145 to $154. Hard penalties are only one example of how organizations can be harmed; other negative impacts resulting from a data breach include share-price erosion and negative publicity resulting in irreparable brand damage.

No Opportunities Without Security

At this time, an increasing number of businesses are adopting big data environments. The time is ripe to make sure security teams are included in these decisions and deployments, particularly since big data environments — which don’t include comprehensive data protection capabilities — represent low-hanging fruit for hackers since they hold so much potentially valuable sensitive data.

Data security is a detailed, continuous responsibility that needs to become part of business as usual for big data environments. Securing data requires a holistic approach to protect organizations from a complex threat landscape across diverse systems.

Data security must complement other security measures such as endpoint security, network security, application security, physical site security and more to create an in-depth approach. By planning ahead and being prepared for the introduction of big data analytics in your organization, you will be able to help your organization meet its objectives securely.

Read the white paper: Finding the path to security in the big data landscape

More from Data Protection

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today