Enterprises fear government is accessing their data on cloud
While a lot has been said about data security in the cloud, a new survey by the Voltage Security revealed that enterprises are largely convinced that the government is snooping around their data that is present in the cloud. Even before the PRISM program grabbed eyeballs on television a few weeks ago, most IT leaders felt that the government was doing so.
According to the report, it showed that 62 percent of senior-level IT and security respondents said they think the government are secretly spying on their corporate data, while it resides in the cloud. The survey was conducted in large enterprise organizations employing more than 5,000 people, representing financial services, retail, healthcare and insurance industries. These results show that there is an urgent need to need to protect sensitive information from exposure, regardless of whether the exposure is caused by a malicious act, an inadvertent slip, a surveillance operation or a failure of protective controls or processes.
“Any sensitive information, including financials, customer and employee data or intellectual property needs to be protected across the entire lifecycle of that data. Any loss or exposure of that data can result in compliance or regulatory fines, loss of brand and reputation and, as the recent NSA events further validate, a loss of privacy around how we communicate and the content of those communications,” said Dave Anderson, Senior Director, Voltage.
The study revealed that an organization’s data protection strategy must include proactive data protection controls, which enables the ability to supervise and manage how underlying data levels are secured through encryption, tokenisation and data masking, as well as how secured data can be used across the organisation while still ensuring compliance. The focus on securing sensitive data, while maintaining regulatory compliance, is becoming even stronger as a result of the surveillance activities over the last few weeks.
People are growing stronger in their beliefs that security, privacy and compliance are not just a tactical, ‘check the box’ activity that they have to do, but rather is a strategic process that adds tremendous value in their ability to securely communicate at all levels.
“Supervisory data protection controls can deliver and maintain compliance with sanctioned government regulations, and avoid any unnecessary ad-hoc snooping and surveillance activities,” said Anderson.
Privacy and security can be effectively balanced with regulatory compliance as part of a comprehensive data protection programme. The ability to ‘de-identify’ information, either through encryption, tokenization or data masking capabilities, provide very effective mechanisms to secure sensitive data, how that data is communicated, used and managed.
This strategy inherently provides an underlying foundation for data privacy as well, ensuring that not just the data level itself is secure, but also that the information can only be accessed and used by authorised users and the specific intended recipients. In this case, privacy and security become much aligned and users and organisations now have the ability to secure any sensitive data, while ensuring communications and use of that data can remain private.
As more organizations leverage the cloud for data processing and analytics, security and privacy become the core requirement across these initiatives. The only way to provide the necessary levels of security to guard against data loss, either through surveillance, a malicious attack, or an inadvertent disclosure, is through a data-centric security program.
“We believe that this approach, which can protect sensitive data across the entire data lifecycle, can allow companies to leverage the benefits of cloud adoption, and ensure their sensitive data is protected from any prying eyes. This approach can completely change the negative view of 62 percent of companies regarding the security of their data in the cloud,” said Anderson.
- What is the future of decision making
- Data Protection: Has the concept and the role of a CXO Evolved?
- It's Advantage India For Satya Nadella and Microsoft
- Here is how IT companies can enable other sectors
- A New Threat In The Cyber Space Post Heartbleed
- Five Biggest Myths On Big Data Revealed
- Changing Dynamics of Data Center
- How GM Is Strengthening Its Cyber-Security Effort
- Digital Life In 2025: Of Possibilities And Fears
- Upgrade Your Skills: Survival Mantra For IT Cos