Is Your Data Safe? How to Assess Your Data Risk - Part 1
May 25, 2021

Christophe Toum
Talend

Share this

Data is one of a company's most valuable assets — but Talend's recent Data Health Survey found only 40% of executives always trust the data they work with.

Today, we have codes and inspections for physical infrastructure, satisfaction surveys for employees, and up-time monitors and stability tests for websites. But are we doing everything we can to understand the degree to which our data is exposed to risk?

There's more to security than protecting yourself from hackers. On one end of the spectrum, you have those big exposures to governmental regulations and security breaches that can shake an entire organization. But even small things — like a little bit of bad data entering the system — can cause a trickle down effect that impacts every department.

We could all be doing a better job of assessing (and mitigating) risk to our data. The key is to start small: just make sure that you have the right data in the right place.

Then you want to make sure that the right people have access to the data and the wrong people don't have access to the data.

Once you have that covered, and you've defined processes for keeping your data clean and standardized, then you can start focusing on making that a daily practice. All it takes is the right combination of people, processes and technology.

What Do We Mean by "Risk?"

When most people think about the risks associated with data, they immediately recall the headline-grabbing data breaches that seem to flood our news feeds with alarming regularity.

But it doesn't take an epic leak affecting millions of users to have serious consequences for most companies. Even a handful of exposed records could have serious legal, financial and reputational repercussions. Fines for GDPR violations alone can run in the millions of dollars, to say nothing of the incalculable cost of losing consumer trust in an increasingly connected and competitive marketplace.

How do these breaches happen?

It can be something as simple as the right data in the wrong place. So much of our conversation about security centers around personally identifiable information (PII). If PII data isn't identified or isn't in the right field — for example, payment information erroneously mapped to an unprotected field and viewed by unauthorized individuals — you could be at risk of exposing some very sensitive information.

But external risks aren't the only dangers we should be worried about. A few years ago, IBM famously calculated that bad data costs US businesses over$3 trillion per year. This is death by a thousand cuts, parceled out in seconds, minutes and hours lost to manual data correction, re-running suspect reports and pursuing strategies and programs that were originally scoped based on data that was later revealed to be faulty.

Of course, the volumes of data we must deal with has grown by over 400% since IBM released that study — and it's only growing.

So how much could we be losing today?

And how much do we stand to lose over the coming years?

Taking all these dangers into account, one thing is clear: no company can afford to expose its data to risk.

Go to: Is Your Data Safe? How to Assess Your Data Risk - Part 2

Christophe Toum is Senior Director of Product Management at Talend
Share this

The Latest

June 22, 2021

Your employees aren't coming back to the office, at least not in the traditional sense. The pandemic shifted almost all industries into remote work. And according to the results of Ivanti's Everywhere Workplace survey, they're not interested in going back to the way things once were ...

June 21, 2021

Respondents to an OpsRamp survey are moving forward with digital transformation, but many are re-evaluating the number and type of tools they're using. There are three main takeaways from the survey ...

June 17, 2021

More and more mainframe decision makers are becoming aware that the traditional way of handling mainframe operations will soon fall by the wayside. The ever-growing demand for newer, faster digital services has placed increased pressure on data centers to keep up as new applications come online, the volume of data handled continually increases, and workloads become increasingly unpredictable. In a recent Forrester Consulting AIOps survey, commissioned by BMC, the majority of respondents cited that they spend too much time reacting to incidents and not enough time finding ways to prevent them ...

June 16, 2021

In the age of digital transformation, enterprises are migrating to open source software (OSS) in droves to streamline operations and improve customer and employee experiences. However, to unlock the deluge of OSS benefits, it's not enough for organizations to simply implement the software. They must take the necessary steps to build an intentional OSS strategy rooted in ongoing third-party support and training ...

June 15, 2021

In Part 1 of this series, we explored the top pain points associated with managing Internet-based WANs today. This second installment will focus on today's most prevalent SD-WAN deployment challenges specifically and what you can do to better manage modern WANs overall ...

June 14, 2021

Enterprise wide-area networks (WANs) have undergone an incredible transformation over the past several years. More often than not, they're hybrid, offering multiple connection paths between WANs. This provides many benefits but also makes them more challenging to manage than ever before. In Part 1 of this series, we'll explore the top pain points associated with Internet-based WANs ...

June 10, 2021

As we have seen during this digital transformation boom during the pandemic, technologists are managing more applications and data than ever before, which has led three quarters of technologists to be concerned with increased IT complexity. Even more significant, 89% admitted to feeling under immense pressure to keep up with the churn, according to the recent AppDynamics Agents of Transformation report. It's clear that the pandemic has pushed many technologists to their breaking point. To help tackle IT burnout, tech professionals need a "canary" to help them streamline and catch the anomalies before they cause any major performance issues ...

June 09, 2021

An hour-long outage this Tuesday ground the Internet to a halt after popular Content Delivery Network (CDN) provider, Fastly, experienced a glitch that downed Reddit, Spotify, HBO Max, Shopify, Stripe and the BBC, to name just a few of properties affected ...

June 08, 2021

Digital experience has existed for a while now. We have now begun to scratch the surface to measure it. So that calls for Digital Experience Monitoring (DEM). DEM extends Application Performance Monitoring (APM) and Network Performance Management (NPM) to view and optimize application performance issues from the end-user perspective ...

June 07, 2021

The rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security, according to Precise, automatic risk and impact assessment is key for DevSecOps, a new report from Dynatrace, based on an independent global survey of 700 CISOs ...