The situation so far...
2014 has seen a serious rise in data breaches on a global (and international) scale. Target, Sony Pictures, Home Depot, to name but a few, are major companies that were hit in the U.S. and earned the most press coverage about their recent protection debacle. In France, communications company Orange was also targeted by ill-intentioned hackers. Dozens and dozens of organizations worldwide were concerned by a data breach from the inside or from an external threat.
Should we be alarmed as individuals whose personal data are thus exposed ? Should companies be more concerned and act more vigorously to prevent such infractions within their walls ?
The answer is a resounding yes to both questions.
A quick visual overview of costs of data breaches and the resulting regulations for enforced data protection :
Don't just react, be proactive !
A first step for medium-sized and large companies should be the hiring of a Chief Data Officer or Data Protection Officer whose task will be to manage an awareness program as to data vulnerability, gather all sensitive informations and rule their access in a strict way. This will also help transform those informations into assets for the company, not just risks, and therefore ensuring growth. End result : everybody's a winner!
The CDO needs specific tools to address this huge and major task on every level, according to the use of data inside the organization.
A tool like our own S.E.A.L., which is a multipurpose database management suite for data testing and data masking, will do the following to make their task easier :
- DISCOVER SENSITIVE DATA AND TABLE RELATIONSHIPS
- DEFINE ANONYMIZATION RULES
- ASSIGN RULES TO SENSITIVE DATA
- RE-USE AND MODIFICATION OF ANONYMIZATION RULES
We aim to answer the increasingly binding requirements concerning data privacy rules for sensitive and critical data. We help you protect confidential data against deliberate or involuntary leaks towards non-authorized environments. We assist you in reducing the time spent in data testing sets creation, fictive data generation and data comparison, before and after testing.
Don't be a passive organization, protect your data now !