« Data is the pollution problem of the information age, and protecting privacy is the environmental challenge. »
bruce schneier, Schneier on safety
It would be an understatement to say that information security has become critical and incredibly complex. Who can blame us with so much at stake, from credit card numbers to state secrets and intellectual property? But as we accumulate more information and ways to access it than ever before, are the layers we’re putting in place to protect it creating unnecessary complexity, perhaps even chaos?
So far, in our modern information management blog series, we’ve discussed information overload and how to overcome it, as well as using AI to discover insights and drive automation. In this blog, we’ll examine how we can simplify cybersecurity while improving our ability to detect and protect against threats and recover from incidents.
More data, more vectors, more risk
According to a recent study Commissioned by OpenText, storing and controlling access to data securely is a significant information challenge for organizations large (40% of respondents said) and small (54% said).
Security becomes a bigger concern as we generate, collect, manage and share more information because it is incredibly valuable. For example, if the information contains intellectual property or personal details, competitive advantage and reliability are at stake. The risk of data theft or loss are obvious concerns, but there is also the risk of not maintaining adequate control of incredibly complex and interconnected data sets, which can quickly lead to non-compliance and severe penalties. On the one hand, we need as much relevant data as possible to drive our digital businesses with insights, but on the other hand, when we accumulate more information, we significantly increase our vulnerability.
It is not just information that is growing in volume and complexity. It is also who accesses, for what reason, through which device and in which geography. Users want to access information faster than ever before, anywhere, on any device, contextualized to what they are trying to achieve. This translates into increased attack vectors for bad actors, complexity for security professionals to manage, and the risk of human error in the proper handling of information.
a simple solution
The saying « There is no such thing as 100% security » reminds us that no matter how many layers of technology, policies, and rules we add, there is a human factor that will always add variation and vulnerability. That fact alone justifies simplified security.
“One of the things I would tell people to do is build security solutions that don’t add more complexity. If we’re putting another fifty silos in existing systems because of security…we’re not really solving the problem,” David Linthicum, technology futurist, author, and director of cloud strategy at Deloitte Consulting, said during a recent CIO Webcast. “Adjust the security systems there in terms of how we are managing and orchestrating the movement of information. It should be modeled as a very logical plan… (instead of) throwing technology at the problem. »
Simplicity arises when the level of security, access and governance applied to the information is adjusted to its nature, the use case and the person or application that accesses it. Simplicity also means automating repetitive or monotonous tasks for users (security professionals and end users alike) to avoid mistakes or shortcuts. For many organizations, this ends up creating vendor proliferation and integration challenges, as more point solutions are needed to accommodate each unique scenario, vulnerability, or endpoint.
To better protect, detect, and recover from attacks, security must be comprehensive, highly integrated, automated, and built into everything from code to the core to the cloud. And by consolidating security vendors, you can simplify your security management, thereby reducing the risk of breach, data loss, or breach.
Modern information management
Effective data protection maintains competitive advantage and builds trust with stakeholders; it should be an integral component of every system in an organization. When security is intrinsic and in context, highly integrated and automated, the complexity and risk that comes with it can be minimized.
Simplified security is a key enabler of modern information management, combining advanced technologies and innovative cloud strategies to connect data, protect knowledge and apply intelligence for any user, any type of data, anywhere, at any time. velocity, for any rule. Organizations leveraging modern information management routinely apply simplified security to solve their business challenges and achieve digital success.
OpenText solutions protect information at the scale today’s businesses need, helping them work smarter and gain the information advantage. Learn more about how your organization can benefit.