We all know that data breaches have continued to escalate at an alarming rate in recent years. In fact, cybersecurity tops the list of IT initiatives for 2017, according to the Enterprise Strategy Group (ESG) brief, “The Importance of Securing Cloud Application Data.” Most of these breaches exploit security gaps involving sensitive data in established, on-premises technologies. As organizations adopt more cloud environments, however, the risks are sure to multiply.

The Journey of Cloud Security

In a private cloud, you can control your own environment. While you cannot steer your own destiny in public cloud environments, you do have to maintain control over your sensitive data and continue to meet compliance requirements.

ESG ranked cloud and cybersecurity as the top two initiatives marked for increased investment by IT departments. According to the report, 49 percent of organizations cited data security as the most compelling reason to boost cloud security, while 87 percent said they were concerned about storing sensitive data in a cloud service.

It’s important to remember that the shift to cloud is a journey that requires careful planning to account for data security, protection and compliance without disrupting the business. An effective cloud security solution should be able to:

  • Support hybrid deployment models.
  • Create and manage data security and compliance needs for your hybrid environment from a single, centralized view, regardless of how scattered your sensitive data is.
  • Monitor internal and external privileged user access across your on-premises and cloud environments.
  • Fully leverage your existing security investments and expand your current policies, processes, dashboards and enterprise integration points.

Three Tips for Moving Sensitive Data to the Cloud

Here are three tips for moving sensitive data securely to the cloud. Even if you’ve already moved your data, it’s not too late to go back and make sure you have accounted for the scenarios described below. An ounce of prevention is worth a pound of cure.

1. Establish a Data-Centric Philosophy

You can’t protect your sensitive data if you don’t know where it is. To cultivate a data-centric philosophy, ask yourself the following questions:

  • How relevant is the sensitive data? To answer this question, you must consider the age of the data, who owns it and whether it is still in use. If the data is very old, unused or related to lines of business that no longer exist, keeping it simply increases your level of risk.
  • How much risk is associated with my sensitive data?
  • What data is most critical? Not all sensitive data is created equal or subject to the same compliance requirements. Prioritize that which is most essential and consider who can access that data.
  • Where is the sensitive data in its natural life cycle? Where can you find it now and where will it move?
  • How much value does the sensitive data provide? You may be storing or moving highly sensitive data to the cloud that’s simply being collected, not used. This only adds more risk. Determine whether your sensitive data is being used, who is using it and how frequently.

2. Make Sure Your Security Solution Uses a Data-Centric Approach

A data-centric approach to cloud security can actively help you answer the questions above and then execute around the answers. A data protection solution should be able to discover sensitive data, harden the environment, monitor access and protect it.

After you discover your sensitive data, assess how sensitive or risky it is. Then, classify the data to keep tabs on its risk level and plan ways to handle that risk when it shows up.

Next, harden the environment to close loopholes that could enable malicious actors to creep into your databases. To do so, find the gaps in your data repositories, fix them and determine who should have access.

You need to monitor your environment, because you can’t protect your sensitive data if you don’t know what’s happening to it. To monitor effectively, you need to know where all your sensitive data lives, have the ability to watch your data in real time and track your progress.

The main objective is to protect your customers, intellectual property (IP), business and brand. However, you must also empower employees with the right levels of access to the right kinds of data so they can do their jobs. Use capabilities such as encryption and redaction to protect data at rest. Similarly, leverage alerting, quarantining and dynamic blocking tools to secure data in motion.

3. Apply Your Approach to All Platforms

Your data-centric security approach is not complete until you apply it to every environment that holds sensitive data. If you can’t monitor and protect your big data environments, for example, or don’t know whether you have sensitive data in certain files or databases, you are still exposed. Your data-centric security approach must adapt as your environment changes with the addition of new platforms, data volumes and users.

By keeping these tips in mind as you move your sensitive data to the cloud, you can position yourself for the greatest possible degree of success and security.

More from Data Protection

Cost of a data breach 2023: Pharmaceutical industry impacts

3 min read - Data breaches are both commonplace and costly in the medical industry.  Two industry verticals that fall under the medical umbrella — healthcare and pharmaceuticals — sit at the top of the list of the highest average cost of a data breach, according to IBM’s Cost of a Data Breach Report 2023. The health industry’s place at the top spot of most costly data breaches is probably not a surprise. With its sensitive and valuable data assets, it is one of…

Cost of a data breach 2023: Financial industry impacts

3 min read - According to the IBM Cost of a Data Breach Report 2023, the global average cost of a data breach in 2023 was $4.45 million, 15% more than in 2020. In response, 51% of organizations plan to increase cybersecurity spending this year. For the financial industry, however, global statistics don’t tell the whole story. Finance firms lose approximately $5.9 million per data breach, 28% higher than the global average. In addition, evolving regulatory concerns play a role in how financial companies…

Advanced analytics can help detect insider threats rapidly

2 min read - While external cyber threats capture headlines, the rise of insider threats from within an organization is a growing concern. In 2023, the average cost of a data breach caused by an insider reached $4.90 million, 9.6% higher than the global average data breach cost of $4.45 million. To effectively combat this danger, integrating advanced analytics into data security software has become a critical and proactive defense strategy. Understanding insider threats Insider threats come from users who abuse authorized access to…

One simple way to cut ransomware recovery costs in half

4 min read - Whichever way you look at the data, it is considerably cheaper to use backups to recover from a ransomware attack than to pay the ransom. The median recovery cost for those that use backups is half the cost incurred by those that paid the ransom, according to a recent study. Similarly, the mean recovery cost is almost $1 million lower for those that used backups. Despite this fact, the use of backups is actually falling. This was one of the…