SlideShare a Scribd company logo
1 of 1
Download to read offline
Importance of Data Protection

The 2011 Cost of a Data Breach Reports, a study by the Ponemon Institute have brought to light some important
facts regarding data breaches. As per this report, malicious attacks are the most expensive causes of data breaches
as it comes to around $222 per record. Moreover, the study also found out that of all the data breaches reported
in 2011, 39% were due to negligent employees. This definitely shows that with hackers using the Internet to put
their malicious plans into action and with negligent employees being the leading cause of data leakage, there is the
need of effective measures to counter it.

The advent of the Internet technology has helped companies and organizations to carry out their business
activities at a lightning pace. Though the Internet has been beneficial to businesses on many counts, it has been
largely responsible for making companies and organizations vulnerable to both internal and external attacks.
However, with Internet becoming an integral part of modern life, the only possible solution to prevent data
leakage and data theft is to implement effective data protection measures.

Besides Internet, the influx of new technologies in the business arena such as social media, mobile and cloud
technologies have thrown open new ways to leak data. With mobiles being the new web access device, any kind of
vulnerabilities, design flaws, or protocol failures in any component of mobile applications, mobile devices and
mobile infra components would adversely affect security. So is the case with cloud computing. Though it is cost
effective and hassle free, cloud computing eventually means moving the corporate data beyond the four walls of
the organization to an internet based environment. Hence, ensuring mobile security and cloud security is highly
important to protect sensitive data from falling into wrong hands.

Unlike European Union’ Data Protection Directive and UK’ Data Protection Act, United States do not have a single
data protection law. In such a scenario, companies and organizations have to implement self-regulation in order to
deal with the issues of data leakage and data theft. Enterprises need to deploy a data protection framework
comprising of measures such as data classification, data flow analysis, and use of tools like data loss prevention
(DLP), information rights management (IRM) so on and so forth. Several service providers are there who can help
companies and organizations in deploying comprehensive data protection framework across their information
lifecycle. Such a move would help enterprises not only in ensuring compliance with various regulations but also in
safeguarding company reputation.

Read more on - privileged identity management, Information Risk Management, identity access management

More Related Content

Viewers also liked

PhoneGap Day EU 2016 Kickoff
PhoneGap Day EU 2016 KickoffPhoneGap Day EU 2016 Kickoff
PhoneGap Day EU 2016 KickoffSimon MacDonald
 
RMIT DFA Seminar
RMIT DFA SeminarRMIT DFA Seminar
RMIT DFA SeminarBryan Chung
 
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...Expolink
 
LogStash - skuteczne narzędzie dla entuzjastów logowania
LogStash  - skuteczne narzędzie dla entuzjastów logowaniaLogStash  - skuteczne narzędzie dla entuzjastów logowania
LogStash - skuteczne narzędzie dla entuzjastów logowania3camp
 
FA creds 12.07 (eng)
FA creds 12.07 (eng)FA creds 12.07 (eng)
FA creds 12.07 (eng)vedernikova
 
The human body. Circulatory system, respiratory system and digestive system
The human body. Circulatory system, respiratory system and digestive systemThe human body. Circulatory system, respiratory system and digestive system
The human body. Circulatory system, respiratory system and digestive systemsonitagon85
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Социально-экономическое развитие СССР в 1953-1964 гг.
Социально-экономическое развитие СССР в 1953-1964 гг.Социально-экономическое развитие СССР в 1953-1964 гг.
Социально-экономическое развитие СССР в 1953-1964 гг.Пётр Ситник
 
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...Пётр Ситник
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB ResultsSymantec
 

Viewers also liked (14)

PhoneGap Day EU 2016 Kickoff
PhoneGap Day EU 2016 KickoffPhoneGap Day EU 2016 Kickoff
PhoneGap Day EU 2016 Kickoff
 
RMIT DFA Seminar
RMIT DFA SeminarRMIT DFA Seminar
RMIT DFA Seminar
 
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...
ГК “ПЛМ Урал”. Владимир Власов. "ССовременные подходы к автоматизации констру...
 
Presentacion lista
Presentacion listaPresentacion lista
Presentacion lista
 
LogStash - skuteczne narzędzie dla entuzjastów logowania
LogStash  - skuteczne narzędzie dla entuzjastów logowaniaLogStash  - skuteczne narzędzie dla entuzjastów logowania
LogStash - skuteczne narzędzie dla entuzjastów logowania
 
Taste
TasteTaste
Taste
 
FA creds 12.07 (eng)
FA creds 12.07 (eng)FA creds 12.07 (eng)
FA creds 12.07 (eng)
 
The human body. Circulatory system, respiratory system and digestive system
The human body. Circulatory system, respiratory system and digestive systemThe human body. Circulatory system, respiratory system and digestive system
The human body. Circulatory system, respiratory system and digestive system
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Социально-экономическое развитие СССР в 1953-1964 гг.
Социально-экономическое развитие СССР в 1953-1964 гг.Социально-экономическое развитие СССР в 1953-1964 гг.
Социально-экономическое развитие СССР в 1953-1964 гг.
 
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...
Социально-экономическое и политическое развитие СССР в середине 1960-х - нача...
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Importance of Data Protection

  • 1. Importance of Data Protection The 2011 Cost of a Data Breach Reports, a study by the Ponemon Institute have brought to light some important facts regarding data breaches. As per this report, malicious attacks are the most expensive causes of data breaches as it comes to around $222 per record. Moreover, the study also found out that of all the data breaches reported in 2011, 39% were due to negligent employees. This definitely shows that with hackers using the Internet to put their malicious plans into action and with negligent employees being the leading cause of data leakage, there is the need of effective measures to counter it. The advent of the Internet technology has helped companies and organizations to carry out their business activities at a lightning pace. Though the Internet has been beneficial to businesses on many counts, it has been largely responsible for making companies and organizations vulnerable to both internal and external attacks. However, with Internet becoming an integral part of modern life, the only possible solution to prevent data leakage and data theft is to implement effective data protection measures. Besides Internet, the influx of new technologies in the business arena such as social media, mobile and cloud technologies have thrown open new ways to leak data. With mobiles being the new web access device, any kind of vulnerabilities, design flaws, or protocol failures in any component of mobile applications, mobile devices and mobile infra components would adversely affect security. So is the case with cloud computing. Though it is cost effective and hassle free, cloud computing eventually means moving the corporate data beyond the four walls of the organization to an internet based environment. Hence, ensuring mobile security and cloud security is highly important to protect sensitive data from falling into wrong hands. Unlike European Union’ Data Protection Directive and UK’ Data Protection Act, United States do not have a single data protection law. In such a scenario, companies and organizations have to implement self-regulation in order to deal with the issues of data leakage and data theft. Enterprises need to deploy a data protection framework comprising of measures such as data classification, data flow analysis, and use of tools like data loss prevention (DLP), information rights management (IRM) so on and so forth. Several service providers are there who can help companies and organizations in deploying comprehensive data protection framework across their information lifecycle. Such a move would help enterprises not only in ensuring compliance with various regulations but also in safeguarding company reputation. Read more on - privileged identity management, Information Risk Management, identity access management