{"id":520,"date":"2017-07-28T10:45:02","date_gmt":"2017-07-28T07:45:02","guid":{"rendered":"http:\/\/kusuaks7\/?p=125"},"modified":"2025-03-31T08:39:27","modified_gmt":"2025-03-31T08:39:27","slug":"data-security-essentials-for-2017","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/data-security-essentials-for-2017\/","title":{"rendered":"Managing Your Big Data Security Strategy in 2017"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"520\" class=\"elementor elementor-520\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5995d72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5995d72\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2d81f7\" data-id=\"b2d81f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d725212 elementor-widget elementor-widget-text-editor\" data-id=\"6d725212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<em><strong>Need training for Big Data?\u00a0<a href=\"https:\/\/www.experfy.com\/training\/tracks\/big-data-training-certification\">Browse courses<\/a>\u00a0developed by industry thought leaders and Experfy in Harvard Innovation Lab.<\/strong><\/em>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-26c50fb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26c50fb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-958bab3\" data-id=\"958bab3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1c586b elementor-widget elementor-widget-text-editor\" data-id=\"a1c586b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the era of Big Data, as the amount of data available for analysis has exploded exponentially, securing that data has become absolutely essential for corporate success. Firms like Target and Home Depot and political entities like the Democratic National Committee\u00a0know first hand the deleterious impact that data breaches can have on the corporate brand and\u00a0bottom line. While the businesses are impacted in different ways, it is the consumers of these businessess who almost always\u00a0suffer the consequences.\u00a0To see how data breaches have impacted you\u00a0personally, you can go to <a href=\"https:\/\/haveibeenpwned.com\/\" rel=\"noopener\">HaveIBeenPwned<\/a>\u00a0and\u00a0enter your email address to identify where your identity has been compromised. If you have been around the Internet block for a while, you are almost certain to find yourself on the list.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-65a3a31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65a3a31\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4cdb479\" data-id=\"4cdb479\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f51f03 elementor-widget elementor-widget-text-editor\" data-id=\"7f51f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAchieving corporate data security requires attention to several basic but essential principles:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-752b377 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"752b377\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2691fb9\" data-id=\"2691fb9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fde09b elementor-widget elementor-widget-text-editor\" data-id=\"6fde09b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol>\n \t<li><strong>Have a Comprehensive Strategy:<\/strong> Data security has several interrelated elements: hardware, security software, network infrastructure, organizational leadership, and policies governing personnel recruitment, training and data access. The best firms do not approach these elements as silos but treat them holistically with an integrated strategy. For example, you can have the best hardware but if your network infrastructure or security software are obsolete, data can easily be corrupted or stolen. Likewise, human error, personnel policies and poor leadership are critical parts of data security. Employees do steal or if poorly trained are unable to intervene effectively to address data threats. Many data breaches are the result of laptops being stolen from a home that had private customer data on them so policies governing the use of laptops are essential. Weakness in any element of data security can corrupt the entire system.<\/li>\n \t<li><strong>Use Hadoop Intelligently:<\/strong> Hadoop has emerged as a powerful tool for storing large amounts of data but because it runs in non-secure mode by default, it is essential to be up-to-date on security and data governance offerings. Cloudera, Hortonworks and MapR have emerged as major Hadoop distribution providers with strong security solutions in the areas of authentication, authorization, and encryption so remaining abreast of the best-in-class Hadoop security tools is vital. The last thing you want to do is to aggregate, perhaps, your most valuable asset (i.e. data) in a Big Data envionment and give others the ability to hack it and take away your competitive advantage.<\/li>\n \t<li><strong>Backup Data:\u00a0<\/strong>Hardware fails. It is a simple fact of life. The only way for those failures not to be catastrophic is for your data to be regularly backed up, whether in the cloud or in your server farms. Aside from the obsolescence that is intrinsic to all hardware, there is the constant threat of theft and the increasingly important threat that climate change-induced disasters&#8211;floods, hurricanes, fires&#8211;pose to data. Regularly backing up data gives you the best chance to overcome those technological, criminal and natural threats.<\/li>\n \t<li><strong>Create a Security Checklist Specific to Your Organization:\u00a0<\/strong>All organizations are different and have distinct data security needs based upon their industry. Those needs impact the database technologies that they utilize and their data priorities. For example, NoSQL databases are used in industries where horizontal scaling and real-time applications are critical. MongoDB, a key NoSQL provider, offers an excellent security checklist that can be adapted for the specific needs of your organization. The same is true with relational databases and increasingly popular cloud-based file sharing technologies. The introspective act of senior leadership, the IT division and various corporate units working together to develop a security checklist can provide the best security firewall of all: democratic engagement throughout the firm in making data security a top priority.<\/li>\n \t<li><strong>Update Data Security Components Regularly:\u00a0<\/strong>Data security is an organic problem as threats are constantly evolving. Hardware, network infrastructure, internal policies and especially security software should be regularly updated to adapt to the ever-changing threat landscape. This can be an enormous challenge but Experfy is developing a suite of Big Data Readiness Indexes that can help you in this regard by keeping you abreast of latest developments and the best solutions for securing data.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-8a490e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a490e7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c3cc9cf\" data-id=\"c3cc9cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0cccc30 elementor-widget elementor-widget-text-editor\" data-id=\"0cccc30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor related Risk Management strategies, see Experfy&#8217;s\u00a0<a href=\"https:\/\/www.experfy.com\/fraud-risk\">Fraud and Risk<\/a>\u00a0Practice areas.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the era of Big Data, as the amount of data available for analysis has exploded exponentially, securing that data has become absolutely essential for corporate success. Firms like Target and Home Depot know first hand the deleterious impact that data breaches can have on the corporate brand and bottom line.<\/p>\n","protected":false},"author":9,"featured_media":2932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[100],"ppma_author":[1615],"class_list":["post-520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-fraud-amp-risk"],"authors":[{"term_id":1615,"user_id":9,"is_guest":0,"slug":"harpreet-singh","display_name":"Harpreet Singh","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Singh","first_name":"Harpreet","job_title":"","description":"Harpreet Singh is the Founder and Co-CEO of Experfy,&nbsp;a big data and IoT consulting and training marketplace in the Harvard Innovation Launch Lab. &nbsp;A Harvard-trained PhD, he&nbsp;works at the intersection of big data, IoT and analytics, developing strategy, roadmaps, advanced algorithms and high performance AI systems. &nbsp;He is the co-author of <em>Big Data in the Age of Mass Personalization&nbsp;<\/em>(forthcoming)."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=520"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/520\/revisions"}],"predecessor-version":[{"id":37510,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/520\/revisions\/37510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/2932"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=520"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}