{"id":861,"date":"2020-07-22T13:10:53","date_gmt":"2020-07-22T13:10:53","guid":{"rendered":"http:\/\/zikzag.wgl-demo.net\/?p=861"},"modified":"2021-12-23T14:52:44","modified_gmt":"2021-12-23T14:52:44","slug":"what-is-real-data-security","status":"publish","type":"post","link":"https:\/\/stash.global\/what-is-real-data-security\/","title":{"rendered":"What Is Real Data Security?"},"content":{"rendered":"\t\t
The \u201csecurity\u201d industry, as a broadly encompassing term, had progressed tenfold since the time before the Internet when confidential information was in physical files, floppy disks, and databases. In the age of the Internet, your information is seemingly everywhere.<\/p>\n
Ensuring that data is properly protected has become a critical need for online businesses. Data erasure or public dissemination by malicious actors or algorithms can be incredibly damaging to an organization’s brand and stock market valuation, not to mention millions of dollars in business downtime, remediation fees and fines, future business malaise, and for smaller businesses, the prospect of going out of business (65% do within 6 months of a breach).<\/p>\n
Today, data encryption and masking are popular techniques for helping to protect an organization’s data. <\/p>\n
<\/p>\n
The Difference Between Cybersecurity & Data Security<\/strong><\/p>\n \u201cCyber\u201d is a word used for anything related to computers, AI, or information technology. For instance, cyberbullying is bullying, which occurs through the medium of technology; there is the interdisciplinary field of Cybernetics; there is even a Tesla Cybertruck. <\/p>\n Case in point\u2013Cyber is a very broad and nebulous term that has a host of different subcontexts and meanings. Data is a much more specific word as it describes the facts, figures, and statistics, which make the basis for reasoning and calculation.<\/p>\n Data security is a specific subset of cybersecurity that focuses specifically on security of data, both structured (usually database data, strings of numerical and alpha figures without boundary or form) and unstructured data (the kind of data that makes up 80% or more of business data: documents, spreadsheets, IP, media, etc. <\/p>\n So when somebody says, \u201cI\u2019m concerned about my Cybersecurity,\u201d more often than not, they are concerned about a sensitive data breach.<\/p>\n <\/p>\n So What is Real Data Security Anyway?<\/b><\/p>\n Let\u2019s take the example of the social security number. Joe Generic\u2019s SSN is 078-05-1120. This nine-digit code is an example of structured data<\/span><\/a>: it resides in a fixed field within a record or a file.<\/span><\/p>\n The only way this code is authentic is if these nine numbers are in this order, ergo structured. In the hands of cybercriminals, personally identifiable information<\/span><\/a> can be quite useful when<\/span> committing identity theft<\/span><\/a>.<\/span><\/p>\n The number sequences 05, 1120, and 078 are meaningless when separated from the full data scheme. By separating, encrypting, and moving these pieces of information to various databases, the encrypted data is entirely secure. If one database is hacked, the information stored within it is useless because it is out of context. <\/p>\n How STASH Provides Real Data Security<\/b><\/p>\n Multi-Factor Authentication (MFA):<\/span> The critical first step to ensure that you are who you claim to be. Organizations that already have their own MFA can simply eliminate this module from the STASH deployment and keep their own if preferable. <\/span><\/p>\n DigitalConfetti\u00ae:<\/span> Unstructured data that is encrypted, parsed , and saved in multiples to multiple locations to maximise security, resilience, and all-the-time permissioned access.<\/span><\/p>\n Keys-on-the-Fly\u00ae:<\/span> <\/span>When a user initiates the process of encrypting or decrypting files via SaaS, or automatic and autonomous APISecure Backup, STASH\u00ae\u2019s Keys-on-the-Fly\u00ae are generated from multiple components when they are needed and destroyed immediately after use. They are not stored anywhere during non-activation when not in use, to avoid snooping<\/span><\/p>\n Digital Rights Management (DRM):<\/span> <\/span>Data access control in and outside of the organization through rules and regulations controlled by the organization, not by STASH\u00ae. An administrator dashboard is the control center; users enjoy a \u2018no-touch\u2019 business-as-usual experience that eliminates responsibility and accountability at their level. <\/span><\/p>\n Always know where data is and who has it; be alerted when data is passed digitally or by portable drive to an unauthorized party; be alerted when someone without permission attempts to access the contents of a file without success. <\/p>\n