Personal data is the biggest problem

Discover tools, trends, and innovations in eu data.
Post Reply
rakhirhif8963
Posts: 702
Joined: Mon Dec 23, 2024 3:15 am

Personal data is the biggest problem

Post by rakhirhif8963 »

In particular, respondents would like to be able to apply compliance and security policies at the user, role, or content class level, rather than having employees manually classify each asset as needed.

When asked what type of sensitive content poses the greatest risk to compliance and security, respondents, as expected, ranked personal information first, followed by intellectual property, legal documents, mergers and acquisitions information, financial documents, and other types of content.

According to the researchers, this concern can be easily linked to the ever-growing list of laws and regulations governing data privacy in different countries, such as the GDPR in Europe.

When asked which communication channels pose cyprus mobile database greatest risk, respondents named email and web forms as the most dangerous. However, the researchers found differences by vertical: organizations in energy and utilities are more concerned about proprietary file-sharing services, organizations in financial services are wary of web forms, and email is seen as the biggest risk in technology, security, and defense.

Respondents, however, agreed that the biggest concern was multi-tenant cloud hosting of such tools, given the ability of threat actors to attack one application or dataset and then move on to other tenants.

Four steps to reduce risks
The researchers identified four steps that organizations can try to take now to reduce the risks associated with data sharing:

A more holistic approach to compliance: Rather than focusing on a “check the box” approach to individual regions, organizations should develop universal best practices, such as those outlined in the NIST CSF.
A more holistic approach to classifying data, categorizing it in more detail, and making it freely accessible to those who really need it, while blocking it for everyone else.
This step is followed by improved insider risk management practices to protect against malicious and accidental disclosure of information.
And finally, the introduction of more comprehensive cyber security measures, as criminal groups realize the value of sensitive content and increase their targeting of the tools used to transmit it; understanding and testing the security features of these tools becomes increasingly important.
Seal
Post Reply