How companies safe from data leaks

Cyber security is becoming more prominent in both the public and private sectors, yet there is still a great deal of confusion about what it actually involves. In fact, the term “cyber security” itself is misleading. The historical term for it was “information security”, and it is worth keeping this in mind. What seems a minor distinction is actually an often-overlooked element of cyber security: ultimately, it is about protecting data, and data is information. In this day and age, information is a form of currency, a source of wealth, albeit a volatile one.

It is here that one of the main problems with cyber security becomes apparent.
The solution can be found through a combination of technological and strategic means. If we are to become tolerant of information leaks, we first need to break down the problem into three actions:
  1. The creation of a pricing model for information
  2. The classification of data based on its value
  3. The enforcement of these classifications
Snowden’s leaks showed just how difficult the whole process is, even for government agencies with significant resources and personnel. Furthermore, in most cases the pricing model is dependent on the company or individual.
Based on this, the chances that we will become tolerant of leaks look bleak, not only because the necessary resources are beyond the budgets of most organizations, but also because current technology is not trustworthy enough to allow total control of information.
Nonetheless, new advances in machine learning (a branch of artificial intelligence) and software-defined networking (a process that allows more control over network flows) could help in automatically classifying information and in enforcing boundaries.
The cyber security industry does not currently – nor will it in the future – have a bulletproof solution to intrusions and data leaks. Clearly, a fundamental shift is needed in the way companies think about their security. Corporate boards and CEOs need to take it seriously and plan accordingly. A great place to start is in assessing the value of the data that is handled daily in their organization. If that understanding trickles down to the rest of the company, we all might be in a stronger position when it comes to cyberthreats.
SHARE

Milan Tomic

Hi. I’m Designer of Blog Magic. I’m CEO/Founder of ThemeXpose. I’m Creative Art Director, Web Designer, UI/UX Designer, Interaction Designer, Industrial Designer, Web Developer, Business Enthusiast, StartUp Enthusiast, Speaker, Writer and Photographer. Inspired to make things looks better.

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment