It may surprise you… or not… to discover that many organisations don’t know where all of their data is stored.
It’s always safe to say that data is kept behind the walls of a database, and the only way to access that data is if you have a username and password. But do organisations and data managers consider the ways that the data entered the business? Sometimes it can be programmed to appear in the database, other times it could have to be manually entered after it had been captured from social media, online forms/chat which may have been sent to an inbox which in turn could have been forwarded on.
The threat to your organisation is now sat over multiple inboxes across your organisation.
So how do you manage your incoming data? Your customer support department, marketing, sales, HR and Accounts – who all amass vast amounts of Personal Identifiable Data (PID)?
It`s impossible to defend your IT infrastructure unless you have an up-to-date list of what you are defending. When you learn that most companies don’t maintain an active list of their assets, it`s not at all surprising that so many get breached.
The single most effective cybersecurity action an organisation can make is to assign a dedicated person to estate discovery and maintain an ongoing ‘as close to real-time’ list of the company assets connected to their IT infrastructure.
Now that we have established that estate discovery is a fundamental piece of your IT security and that without it you will almost certainly get the blame for breaches, let`s take a look at what you can do right now…
Your first step is to immediately eliminate all of those blind spots, and you should view them as black holes full of security, legal and compliance risk that need to be plugged.
To do that, you require a tool that will give you visibility over every part of your network; and ideally, one that conforms to estate discovery best practice.
RiskView is that tool. It is designed to eliminate manual estate discovery, therefore saving valuable time and money. It ensures the highest levels of accuracy to provide intelligent insights that can add real value. The kind of value that will locate risk even when you don`t know it’s there.View More Articles
- 22nd July 2019The Human Element of Data Security
- 15th July 2019Third Party Data Protection
- 10th July 2019Two Fines in Two Days – ICO Plans to Fine Marriot £99m
- 10th July 2019ICO Issues A Record Fine for BA
- 2nd July 2019Do You Have True Visibility of Your Data?
- 18th June 2019Reduce Your Exposure to a Data Breach
- 15th May 2019Organisations Relationship with Cybersecurity and their Workforce – In Scope
- 9th May 2019Subject Access Requests
- 1st May 2019Data Discovery
- 26th April 2019Defence In Depth