So, you’ve identified that your information is at risk of being lost or stolen – now what? The most common reaction is to rush the selection and implementation of some kind of technical control(s) to eliminate the risk.
Derek Brink, VP and Research Fellow at Aberdeen Group, points out in his recent report that this “bias towards action” often overlooks two critical components for securing information: identification of data and the definition of clear data handling policies.
- Know where your sensitive data is
Most organizations don’t really know how much data they have and where it all is. Organizations are producing vast amounts of files and documents that are spread across multiple platforms – from on-premise networks to the Cloud, and across various devices like Windows and Mac desktops, and Android and iOS mobile devices. Without understanding where this information is, how can an organization expect to control data sharing?
- Know how sensitive data should be handled
An often overlooked challenge to information protection is the failure to clearly define the sensitivity of unstructured data, leaving users and security systems struggling to make decisions that keep information safe. Knowing the value of the information “enables information to be shared while still being protected.”
Why does this all matter? Organizations rely heavily on data to generate revenue, serve customers and for business intelligence. It is essential that this data is shared and protected at the same time.
Aberdeen Research provides five recommendations to help organizations address the two biggest obstacles to an effective data security program. Check out the webinar to learn how you can overcome these obstacles in your organization.