Page 17 - NOVEMBER MAGAZINE 2022
P. 17
The Rise of Data Protection
With our lives becoming data- Isolation is the first thing to be
driven, its protection and privacy done by disconnecting from the
are paramount. Data breaches internet, removing remote
and theft can have tremendous access, changing the settings of
consequences for businesses, the firewall, and updating the
companies, institutions, and credentials of the affected
Lack of data individuals. Data in the wrong system/account, which may
protection measures, hands can be destructive. Hence prevent further attacks.
the global pandemic, the need for securing all types of Fighting Malicious Intent
accounts, applications, and Security research suggests that
and the proliferation systems continues to increase. many companies have poor
of exploitation Reasons behind Protection Gaps cybersecurity practices, making
techniques have led Lack of data protection measures, them vulnerable to data loss. To
to a surge the global pandemic, and the s u c c e s s f u l l y fi g h t a g a i n s t
malicious intent, companies
in hacking and proliferation of exploitation m u s t m a k e c y b e r s e c u r i t y
techniques have led to a surge in
data breaches. awareness, prevention, and
hacking and data breaches from
security best practices a part of
sources that are increasingly their culture. Organizations must
With more than 20 years in the common in the workplace, such c o n s i d e r I T s y s t e m s a n d
industry, Avneesh Kumar Vats is as mobile and IoT (internet of a p p l i c a t i o n s a s t h e m o s t
a visionary leader who brings a
things) devices. important instruments in their
vast amount of experience in IT
Also, COVID-19 ramped up growth.
development & management,
remote workforces, making Predictions for 2023 & Beyond
N e t w o r k d e s i g n , C l o u d
inroads for cyberattacks. These We can expect the growth of
management, IT services, and
less secure systems and devices technologies such as Cloud data
m o r e . A t E E S L , h e h a s
are weak links for cybercriminals protection (CDP), Tokenisation,
successfully developed the road to exploit. Big data encryption, Data access
map for integrating 1.25 Cr LED Recovering Data governance, Consent/data
street lights, leading from the The first step is to isolate the
subject rights management, Data
front. infected device from the network
privacy management solutions,
In the following piece, he to prevent the malware from D a t a d i s c o v e r y a n d fl o w
elaborates on how data security spreading. Also, the attack must m a p p i n g , a n d D a t a
is integral to smooth business be reported immediately to the C l a s s i fi c a t i o n , a s w e l l a s
operations. authorities for a coordinated Enterprise key management.
recovery effort.
Nov. 2022