Blog

Battle Hackers with Counterfeit Data

Imagine that you owned a bank, First Imaginary Bank. Lots of your friends own other banks also. Sadly, they have been the victim of frequent bank robberies and you are afraid that you may be next.

Imagine that you owned a bank, First Imaginary Bank. Lots of your friends own other banks also. Sadly, they have been the victim of frequent bank robberies and you are afraid that you may be next. Your vault manager comes up with a brilliant idea! In addition to the money that you have in your bank, place counterfeit money throughout the bank as well.  

If the robbers get in, and you know they will, then they won't be able to tell the real money from the counterfeit money. Now most of us don't own banks, but we are in a continual fight to prevent hackers from stealing the sensitive data that we have. Many organizations keep many, many copies of real data throughout their environments.

This gives the hackers many targets to choose from. If we replaced all but the essential copies of real data with fictitious data, then when hackers get in, they won't know the real from the fictitious data. They only know that it is data. This not only gives you more time to find the intrusion, but allows you to look for your bogus data for sale as an indication that your environment has been compromised as well as concentrate your defenses on the real data. @DataPrivacyDude