Is Your Data Safe? How to Assess Your Data Risk - Part 1
May 25, 2021

Christophe Toum
Talend

Share this

Data is one of a company's most valuable assets — but Talend's recent Data Health Survey found only 40% of executives always trust the data they work with.

Today, we have codes and inspections for physical infrastructure, satisfaction surveys for employees, and up-time monitors and stability tests for websites. But are we doing everything we can to understand the degree to which our data is exposed to risk?

There's more to security than protecting yourself from hackers. On one end of the spectrum, you have those big exposures to governmental regulations and security breaches that can shake an entire organization. But even small things — like a little bit of bad data entering the system — can cause a trickle down effect that impacts every department.

We could all be doing a better job of assessing (and mitigating) risk to our data. The key is to start small: just make sure that you have the right data in the right place.

Then you want to make sure that the right people have access to the data and the wrong people don't have access to the data.

Once you have that covered, and you've defined processes for keeping your data clean and standardized, then you can start focusing on making that a daily practice. All it takes is the right combination of people, processes and technology.

What Do We Mean by "Risk?"

When most people think about the risks associated with data, they immediately recall the headline-grabbing data breaches that seem to flood our news feeds with alarming regularity.

But it doesn't take an epic leak affecting millions of users to have serious consequences for most companies. Even a handful of exposed records could have serious legal, financial and reputational repercussions. Fines for GDPR violations alone can run in the millions of dollars, to say nothing of the incalculable cost of losing consumer trust in an increasingly connected and competitive marketplace.

How do these breaches happen?

It can be something as simple as the right data in the wrong place. So much of our conversation about security centers around personally identifiable information (PII). If PII data isn't identified or isn't in the right field — for example, payment information erroneously mapped to an unprotected field and viewed by unauthorized individuals — you could be at risk of exposing some very sensitive information.

But external risks aren't the only dangers we should be worried about. A few years ago, IBM famously calculated that bad data costs US businesses over$3 trillion per year. This is death by a thousand cuts, parceled out in seconds, minutes and hours lost to manual data correction, re-running suspect reports and pursuing strategies and programs that were originally scoped based on data that was later revealed to be faulty.

Of course, the volumes of data we must deal with has grown by over 400% since IBM released that study — and it's only growing.

So how much could we be losing today?

And how much do we stand to lose over the coming years?

Taking all these dangers into account, one thing is clear: no company can afford to expose its data to risk.

Go to: Is Your Data Safe? How to Assess Your Data Risk - Part 2

Christophe Toum is Senior Director of Product Management at Talend
Share this

The Latest

April 25, 2024

The use of hybrid multicloud models is forecasted to double over the next one to three years as IT decision makers are facing new pressures to modernize IT infrastructures because of drivers like AI, security, and sustainability, according to the Enterprise Cloud Index (ECI) report from Nutanix ...

April 24, 2024

Over the last 20 years Digital Employee Experience has become a necessity for companies committed to digital transformation and improving IT experiences. In fact, by 2025, more than 50% of IT organizations will use digital employee experience to prioritize and measure digital initiative success ...

April 23, 2024

While most companies are now deploying cloud-based technologies, the 2024 Secure Cloud Networking Field Report from Aviatrix found that there is a silent struggle to maximize value from those investments. Many of the challenges organizations have faced over the past several years have evolved, but continue today ...

April 22, 2024

In our latest research, Cisco's The App Attention Index 2023: Beware the Application Generation, 62% of consumers report their expectations for digital experiences are far higher than they were two years ago, and 64% state they are less forgiving of poor digital services than they were just 12 months ago ...

April 19, 2024

In MEAN TIME TO INSIGHT Episode 5, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the network source of truth ...

April 18, 2024

A vast majority (89%) of organizations have rapidly expanded their technology in the past few years and three quarters (76%) say it's brought with it increased "chaos" that they have to manage, according to Situation Report 2024: Managing Technology Chaos from Software AG ...

April 17, 2024

In 2024 the number one challenge facing IT teams is a lack of skilled workers, and many are turning to automation as an answer, according to IT Trends: 2024 Industry Report ...

April 16, 2024

Organizations are continuing to embrace multicloud environments and cloud-native architectures to enable rapid transformation and deliver secure innovation. However, despite the speed, scale, and agility enabled by these modern cloud ecosystems, organizations are struggling to manage the explosion of data they create, according to The state of observability 2024: Overcoming complexity through AI-driven analytics and automation strategies, a report from Dynatrace ...

April 15, 2024

Organizations recognize the value of observability, but only 10% of them are actually practicing full observability of their applications and infrastructure. This is among the key findings from the recently completed Logz.io 2024 Observability Pulse Survey and Report ...

April 11, 2024

Businesses must adopt a comprehensive Internet Performance Monitoring (IPM) strategy, says Enterprise Management Associates (EMA), a leading IT analyst research firm. This strategy is crucial to bridge the significant observability gap within today's complex IT infrastructures. The recommendation is particularly timely, given that 99% of enterprises are expanding their use of the Internet as a primary connectivity conduit while facing challenges due to the inefficiency of multiple, disjointed monitoring tools, according to Modern Enterprises Must Boost Observability with Internet Performance Monitoring, a new report from EMA and Catchpoint ...