You Have Big Data, Or Perhaps Just Too Much Data?

There is more data available to organisations today than ever before. In 2015 alone, customers, employees, and other users created about 7.9 zettabytes of data globally, and that number is expected to reach 35 zettabytes in 2020.

The type of information that companies are collecting is also multiplying, from traditional sources such as customer mailing addresses and phone numbers to more advanced demographics, web histories, shopping preferences, and even biometric data.

Advances in technology, computer power, and analytics mean companies can collect and process data in almost real-time. This may lead executives to believe that the more data they have, the greater their advantage. However, collecting a virtually unlimited amount of data can create a serious threat for organizations, because the amount collected often outstrips the ability to protect it.

In fact, when CEB surveyed 54 information risk executives around the globe in 2015, more than three-quarters of them indicated it is harder, or significantly harder, to prevent data breaches than in the past.

If a company does have a data breach containing certain types of sensitive personal information, such as social security numbers or health records, it can trigger additional burdensome legal duties and invite increased regulatory scrutiny, not to mention potential reputational damage.

The simplest way to protect sensitive data is not to have it in the first place. But companies drawn in by big data's tantalizing promises often collect too much information in the hopes they will find the time and resources to analyze it later.

Worse, companies often keep data long after its usefulness has passed. Ultimately, there's a difference between big data and "lots of data," and organizations need to regularly evaluate how they use data and set clear guidelines for what they collect and store.

Assess the Value of Data You Collect

Assessing and evaluating the true value of data, and the potential risk of a breach, will help IT leaders set their data strategy and avoid collecting too much. But IT can't do it alone. Creating a sensible data management strategy requires input from stakeholders across the business.

CIOs and other IT leaders charged with managing and protecting data can get the conversation started by asking these six questions:

1. What is the business need for the information we collect? Too often, companies use a "collect now, analyze later" approach, thinking that more information is better. Instead, leaders should carefully consider how the information will help them achieve their corporate strategy and performance objectives.

2. Do we have the capabilities to use the data effectively? In addition to understanding the data's value, leaders need to evaluate whether their teams have the skills and capabilities needed to collect, manage, and analyze it. Analytic capabilities required to use and apply information in decision making are rare. Without a capable team of analysts and data experts ready to turn data into insight, it may sit untapped, or worse, be misused.

3. How would the public react to the information we collect and how we use it? Merely because companies can lawfully collect an enormous amount of customer and employee data doesn't mean they should. Leading companies are working to better understand how customers and employees feel about providing personal data. They weigh the data's potential value against the potential reputational harm from the public knowing the information is being collected, in order to decide whether to collect it.

4. What information do we need to protect, and at what level and at what cost? Keeping all company information secure is important, but certain types of information like credit card and social security numbers require heightened protection under specific privacy laws or regulations. Losing such sensitive information can turn a data breach into a full-blown privacy failure. Companies need to address and classify these types of information and understand the oversight and compliance costs to retain them.

5. How long should we keep sensitive data? As business changes, previously collected data can be forgotten. Leading companies incorporate the data they collect into their records management policies to ensure the data does not exist indefinitely. Establishing data's shelf life is a critical step in minimizing the risk of a costly data breach involving low-value data.

6. Who needs access to the information? Given the multitude of ways to use data, many employees will need access to collected data or to the results of its application. A comprehensive understanding of who will be working with the data can help prioritize risks and pinpoint potential breach points. When determining this, leaders should identify which functions will handle the data, how they will use it, and who might need continuous (as opposed to one-time) access. Take steps to ensure employees who don't need access to sensitive data don't have it.

Information drives many aspects of corporate performance. That said, failing to secure data, lingering reputational harm. IT professionals have had a role to play in helping their companies adequately assess and evaluate the true value of their data and the potential risk of a breach in order. The best way to do this is to set a successful data strategy and to avoid collecting too much information.

InformationWeek

 

« FBI: Don’t Pay Bitcoin Ransomware
Special Report: CEOs And IT Innovation (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Aleo

Aleo

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.