Data Security
Data Security
Every new SaaS license you purchase brings with it its own set of security
risks and vulnerabilities. In the last few months, there have been
repeated headlines on security flaws in Zoom and how it exposed
confidential communication data. When shopping for a SaaS product,
submitting RFPs, and writing the SLAs, make data security a central
parameter.
For example, Slack has recently enhanced its data security controls to give
admins better visibility and simplify data-related compliance. Its new
enterprise key management feature encrypts a custom workflow from
end to end, while Slack audit logs maintain detailed records – which, as
we mentioned, is a key component of data security.
Going through the product documentation and holding data security
workshops with your vendor will help to make safer purchase decisions.
Take lessons from recent attacks where the company failed to assume
accountability on time. For example, Uber’s former Chief Security
Officer now faces a summons with U.S. Marshals for not reporting a 2016
hack, trying to pay off the threat actors instead. In such cases, it is
advisable to consult an experienced domain expert – which brings us to
the next step.
A legal specialist can help you better navigate the evolving laws around
data security, privacy, and utilization, tailoring your strategy to the needs
of a specific region or industry. Involving a specialist at the early stages of
policy implementation can help configure your framework more
effectively, select the most security-friendly technology enablers, and
respond appropriately in a worst-case scenario.
There are several organizations to help you with this. For example, the
global law firm, Winston & Strawn LLP, has a new practice for global
privacy and data security. “The almost-universal remote work
environment caused by the COVID-19 pandemic has added to the
challenge of providing access to information while ensuring systems are
not vulnerable and abiding by the privacy and data security
laws,” says Sheryl Falk, co-leader of the practice.
In an agile world, where iterations and updates are released every next
month or week, security flaws in your applications have a very large
reach. Choose a DataOps solution like Delphix to maintain development
speeds without compromising on data security. Delphix can create a
secure virtual environment, manage sensitive data, maintain data version
control, and revert data to any historical point as needed during
development.
There is no clear data security policy for retiring datasets
Most data security laws come with storage limitations, restricting
companies from holding onto data beyond a justifiable cause. In other
words, you can’t store data for future analysis unless you have already
identified the purpose and impact of the said analysis. To comply,
enterprises must institute a clear data retention period, after which it
enters the retirement stage.
The proliferation of digital tools will only add to the challenges in data
security. That’s why it is essential for enterprises to take a proactive
stance and follow data security best practices, keeping pace with evolving
threat variants.
Data security rules apply equally to both external and internal users. For
example, laws like GDPR and CCPA mandate similar privacy, consent, and
autonomy rights for every user, regardless of whether they are an
external customer or they fall within the purview of contractual employee
agreements.
Did you know that even in 2020, where so many companies are facing
high-value data breaches, 1 out of every 142 passwords continues to be
123456? This statistic illustrates the human tendency to get lazy about
password management for the sake of convenience. Add to this,
common password management bad habits like writing it down on a
piece of paper that’s readily accessible and using the same password for
multiple applications. Proper password management guidelines are
essential to not just protecting data, but also your enterprise assets as a
whole.