Page 17 - NOVEMBER MAGAZINE 2022
P. 17

The Rise of Data Protection

                                             With  our  lives  becoming  data-    Isolation  is  the  first  thing  to  be
                                             driven, its protection and privacy   done  by  disconnecting  from  the

                                             are  paramount.  Data  breaches      internet,  removing  remote
                                             and  theft  can  have  tremendous    access, changing the settings of

                                             consequences  for  businesses,       the  firewall,  and  updating  the

                                             companies,  institutions,  and       credentials  of  the  affected
            Lack of data                     individuals.  Data  in  the  wrong   system/account,  which  may

    protection measures,                     hands can be destructive. Hence      prevent further attacks.

    the global pandemic,                     the need for securing all types of   Fighting Malicious Intent
                                             accounts,  applications,  and        Security  research  suggests  that
     and the proliferation                   systems continues to increase.       many  companies  have  poor

          of exploitation                    Reasons behind Protection Gaps       cybersecurity  practices,  making

     techniques have led                     Lack of data protection measures,    them vulnerable to data loss. To

             to a surge                      the  global  pandemic,  and  the     s u c c e s s f u l l y   fi g h t   a g a i n s t
                                                                                  malicious  intent,  companies
         in hacking and                      proliferation  of  exploitation      m u s t   m a k e   c y b e r s e c u r i t y
                                             techniques have led to a surge in
         data breaches.                                                           awareness,  prevention,  and
                                             hacking and data breaches from
                                                                                  security best practices a part of
                                             sources  that  are  increasingly     their culture. Organizations must
       With more than 20 years in the        common  in  the  workplace,  such    c o n s i d e r   I T   s y s t e m s   a n d

       industry, Avneesh Kumar Vats is       as  mobile  and  IoT  (internet  of   a p p l i c a t i o n s   a s   t h e   m o s t
       a visionary leader who brings a
                                             things) devices.                     important  instruments  in  their
       vast amount of experience in IT
                                             Also,  COVID-19  ramped  up          growth.
       development  &  management,
                                             remote  workforces,  making          Predictions for 2023 & Beyond
       N e t w o r k   d e s i g n ,   C l o u d
                                             inroads  for  cyberattacks.  These   We  can  expect  the  growth  of
       management,  IT  services,  and
                                             less secure systems and devices      technologies such as Cloud data
       m o r e .   A t   E E S L ,   h e   h a s
                                             are weak links for cybercriminals    protection  (CDP),  Tokenisation,
       successfully developed the road       to exploit.                          Big data encryption, Data access
       map  for  integrating  1.25  Cr  LED   Recovering Data                     governance,  Consent/data

       street  lights,  leading  from  the   The  first  step  is  to  isolate  the
                                                                                  subject rights management, Data
       front.                                infected device from the network
                                                                                  privacy  management  solutions,
       In  the  following  piece,  he        to  prevent  the  malware  from      D a t a   d i s c o v e r y   a n d   fl o w
       elaborates on how data security       spreading. Also, the attack must     m a p p i n g ,   a n d   D a t a

       is  integral  to  smooth  business    be  reported  immediately  to  the   C l a s s i fi c a t i o n ,   a s   w e l l   a s

       operations.                           authorities  for  a  coordinated     Enterprise key management.
                                             recovery effort.


                                                                                                               Nov. 2022
   12   13   14   15   16   17   18   19   20   21   22