Blog

Cybersecurity - Step 1: What am I protecting?

Every day we see another data breach and more personal information and intellectual property that has been compromised. Some of these are attacks and some are accidents.

Every day we see another data breach and more personal information and intellectual property that has been compromised. Some of these are attacks and some are accidents. Regardless of how a breach may happen it behooves us to take measures to safeguard our data. But, we can't protect our data without first knowing where the sensitive data is.

Sensitive Data Discovery, or Profiling, should be an automated process to enable us to quickly create an inventory of personally identifiable information (PII), personal health information (PHI), payment card information (PCI), and intellectual property (IP). The inventory should be comprehensive and include data that resides on both mainframe and distributed platforms.

Automated Sensitive Data Discovery is an easy first step to guard our data, boost our security and serve as a guide to where we should be focusing our time and security investment. It provides a basis for us to ensure that entitlements to access Sensitive Data is correct and also provides valuable input for any cloud or collocation vendor that we may use.