#HowTo Avoid Potential Valuable Data Discovery Snags

#HowTo: Avoid Potential Valuable Data Discovery Snags

Updated On:

#HowTo: Avoid Potential Valuable Data Discovery Snags – A significant element of any data security, risk management and compliance policy is a data classification procedure, as it makes it simpler to find and retrieve data. Yet indeed, many companies struggle with the process.

A panel of data scientists and security experts to identify the most common snags around discovering and properly classifying data, and how they can be avoided. Here’s what they discussed.

new_releases

Sector-Based Security: Bad Bots Targeting The E-Commerce Sector

Lack Of Goal Setting

Among the most common issues with data discovery and classification is the lack of goal setting from the outset. Too often, the objective is to capture more data, and the assumption is that will help influence decision making. However, the actual decisions that need further influence are frequently not considered early enough. This lack of goal setting leads to outcomes that may have no significant business value relative to the time spent on the data.

Before setting out on data discovery and classification, make sure there are clear goals in mind of what the data is going to help achieve.

new_releases

Zero Trust: Five Misconception Debunked About Zero Trust’s Dependability

‘Paralysis By Analysis’

Organizations often run into the problem of ‘paralysis by analysis.’ Too often, analysts get far too caught up in the data. People put time and effort into collecting, cleaning, and centralizing it, but then what? Data on its own is just raw information. Obsessing over it like this is a mistake, and organizations need to shift toward an obsession with taking this information and transforming it into knowledge. Only then can it help organizations generate wisdom.

Failing To Realize The Value Of Data Discovery

In itself, data discovery and classification hold no intrinsic value. Organizations can’t expect to adequately improve data security and compliance solely through locating and labelling data. They will only start to see real value when it is used in conjunction with other data security practices.

new_releases

Entrust The Big Machine: How Security Analysts May Alleviate Control

For example, once an organization has found out where their most at-risk data resides within its infrastructure, what do they do next? Can they determine who has access to that data, who’s making changes to it, what those changes are, and whether the environment surrounding is secure enough?

It is potent and essential to discover and classify data, but that should not exist in a silo. Combining this functionality with permissions analysis, user and entity behavior analytics, and change auditing will enable the true value to emerge.

Poor Data Quality Hinders Ability To Deliver Customer-Centric Value

To avoid this pitfall, plan search and segmentation fields ahead of time to ensure the search criteria delivers the expected value. Develop a governance plan with a clear delineation of who is responsible for entering, validating, and maintaining the data; and establish user protocols regarding where data get entered, and when.

new_releases

Electron Framework Vulnerabilities: Securing The Electron Apps Backdoor

Also, select a CRM tool that is easy to access and use in every situation where users communicate with customers and prospects (e.g., email, on a social, on the web, and while mobile), that consolidates all business contacts and automates data entry and data enrichment. Data enrichment can either be provided via a third-party tool like ZoomInfo or DiscoverOrg or offered in-the-box with a small business CRM, such as Nimble.

Trying To Solve Problems Beyond Human Scale

In the enterprise, there are problems simply beyond human scale. Some organizations are sitting on petabytes of data they don’t even know about, to say nothing about the volumes of data being created every day. Due to the incredible quantity of information corporations in their own, discovery and classification become impossible.

new_releases

PSD2 (Second Payment Services Directive): Security Practices Payment Standards

Artificial Intelligence: AI-powered self-classification is feasible today, trained on a tiny subset of accurately known information. Machine learning tools are the only way organizations can hope to make significant headway.

It’s not perfect, but it’s a process that improves over time as the machine learns what defines a document specific to an organization. It means the companies that start the process now are in a better position to leverage more of their data in the future and provide cleaner data fuel for future predictive AI-powered analytics and decision making.

new_releases

Bridge The Gap: Evaluating The Skills And Abilities Of A Security Team

Giving Valuable Data Away

Data discovery eventually leads to data storage requirements and the creation of irresistible honeypots for malicious third parties. Combine that with chronic levels of employee-centric data breaches, and it can create a recipe for disaster.

While doing data discovery looks like work and may seem like a productive use of time to the user, it is easy for casual users spend time analyzing data without purpose. Data is the new oil – don’t give it away.

Across such a broad and detailed discipline, the pitfalls and remedies will shift as new approaches and products emerge, but avoiding common and foundational issues will allow organizations to maximize their investment in data discovery.

, , , , , , , , , , , ,
Previous Post
TLS 1.3 (Transport Layer Security (TLS) Protocol): Are You Keen To Intercept Lawfully?
Next Post
How Secure Are Smart Cities In Real, While Balancing Privacy With Innovation?

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Menu

Pin It on Pinterest