Data Classification

Breaches over the past few years have gone from dangerous to disturbing to devastating. The firewall is faltering and new battlefields are popping up in the landscape of cyber security. New roads into your network.

And more and more businesses are finding a massive vulnerability in their unstructured data.

Think about it. Some secret data is easy to find—credit card numbers, social security numbers and other info you can search for directly. But think of all the other sensitive data you can’t search for—employee info, corporate secrets, intellectual property and more.

And you can’t protect what you don’t know you have in play.

We can help you get a picture of your data landscape—and we’re not the only ones who can—but no discovery scan is perfect. What you really need is an answer for tomorrow. And the day after and every other day after.

Data Classification

Enough working backwards–trying to sort the data already created. Has to be done, sure, but it won’t be perfect or permanent. The only permanent solution is to classify each piece of data as it is created, assigning each a level of risk.

And this can’t be a manual process. You don’t have an endless workforce with nothing better to do. As with everything, the answer has two parts: policy and tools.

Now, being too tool-centric is a mistake. But we’ve really been waiting on these tools for a while. We’re talking about automatically analyzing the context surrounding a new document, email, spreadsheet, whatever—see who made it, when they made it, what client it’s connected to etc.—and assign it a classification. You can provide an automatic label, a risk score, for every piece of data you have.

Then the second part is on you. You need a model for levels of classification from public to restricted to why-did-we-even-write-it-down. This means deciding on a level of encryption and restriction—who can see what.

And you need to keep it simple. Think in the range of 4 buckets, not 10. This also means constantly assessing and enforcing compliance with your own model. But it also means exponentially strengthening your security.

You need to know what you don’t know so it can’t hurt you. We can show you.

Learn more & start the conversation today

Project Details

Date: June 29, 2015
Tags: business-services-video, infrastructure, security-services-video