SlideShare a Scribd company logo
1 of 3
Download to read offline
7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk
https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 1/3
Dark Data Management: Mitigating the Risks of the
Invisible
Dark data is a major challenge in enterprises, and it’s not going away soon. Fortunately, there are
ways to reduce dark data and the risks that come with it.
Many businesses unknowingly ignore an entire category of data essential to their data protection and
management policies in today’s ostensibly endless data volume and complexity. According to recent
research by Veritas, Data’s Dark Side, a company’s data is typically more than 50% “dark,” or
information stored in data repositories but has no assigned or established value. Dark data pose
severe threats to an enterprise’s security and compliance efforts and has high storage costs, making
it more crucial than ever to solve the underlying problems that lead to it.
Dark data threatens protection
The majority of firms are unclear about the data they must secure. Dark data reservoirs, which may
house sensitive and important data, constitute a tempting target for hackers and ransomware
attacks since dark data is frequently out of sight and out of mind for many companies. Clearly,
understanding the data’s nature, location, and value is essential for surviving any ransomware
assault. Organizations will be more successful in knowing how to safeguard data from risk and
recover after an attack if they have a greater understanding of their data.
Dark data threatens compliance
Untagged and unstructured data makes it challenging to comply with continually changing regulatory
environments. To comply with data compliance regulations, businesses may strategically implement
data gathering, archiving, and surveillance capabilities. Companies will be able to adhere to strict
standards and adopt retention rules throughout their whole data estate with better management of
dark data.
By Swapnil Mishra - July 13, 2022
7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk
https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 2/3
Dark data and sustainability
Dark data plays a significant role in an enterprise’s environmental compliance. The environmental
cost of dark data must be given attention as businesses attempt to create sustainability initiatives
that will fulfill carbon reduction objectives. Companies must eliminate unnecessary data from their
data centers and clouds to safeguard the environment from dark data. Enterprises have a great
chance to lower their carbon footprint, adhere to industry environmental requirements, and achieve
sustainability goals that are becoming more and more relevant to various stakeholders by
appropriately handling dark data.
Also Read: Five Trends That Will Drive the Data Center of the Future
Managing and protecting dark data
Dark data compromises an organization’s compliance and security. Here is how data managers can
better identify, manage and protect dark data within their company:
Proactive Data Management
For enterprises to obtain visibility into their data, manage data-related risks, and decide which data to
keep versus delete before a critical security event occurs, data officers must adapt and act from a
proactive data management mindset. Data managers can implement tactics to establish a proactive
mindset, are data mapping and data minimization. These tactics can discover all sources and
locations of collected and stored data, reduce the amount of data being stored and confirm that
retained data is directly related to the purpose in which it was collected.
Using Technology Advancements
Businesses could benefit from technological improvements as well. Large pools of untagged,
unstructured data may be efficiently identified, managed, and protected due to Artificial Intelligence
(AI) and Machine Learning (ML), which also play a crucial part in data management procedures. To
ensure that sensitive or risky data is correctly managed and safeguarded, regardless of where it
resides, the ultimate goal is to collect the information, not just the data, at the source (edge). This
can be accomplished by fast scanning, labeling, and classifying information. As a result, by
identifying vulnerabilities and mitigating risks, transparent AI and ML rules assist enterprises in
gaining complete visibility into their data. The next frontier is that.
By lowering costs and enabling actions through untapped intelligence, properly managed dark data
provides enterprises with a safer and more compliant future. It also opens up opportunities for
organizational optimization and innovation within any company.
Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google
News Enterprisetalk News.

7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk
https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 3/3
Swapnil Mishra
Swapnil Mishra is a Business News Reporter with OnDot Media. She is a journalism graduate with 5+ years of experience in journalism
and mass communication. Previously Swapnil has worked with media outlets like NewsX, MSN, and News24.


More Related Content

More from Enterprise Insider

More from Enterprise Insider (20)

Why MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdfWhy MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdf
 
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdfFour Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
 
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdfIndispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdf
 
How an Inclusive C-Suite Changes Organization Perspective.pdf
How an Inclusive C-Suite Changes Organization Perspective.pdfHow an Inclusive C-Suite Changes Organization Perspective.pdf
How an Inclusive C-Suite Changes Organization Perspective.pdf
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
 
Four Crucial Steps CISOs Should Consider During Uncertain Times.pdf
Four Crucial Steps CISOs Should Consider During Uncertain Times.pdfFour Crucial Steps CISOs Should Consider During Uncertain Times.pdf
Four Crucial Steps CISOs Should Consider During Uncertain Times.pdf
 
Key Success Factors for Digital Transformation.pdf
Key Success Factors for Digital Transformation.pdfKey Success Factors for Digital Transformation.pdf
Key Success Factors for Digital Transformation.pdf
 
The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf
The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdfThe Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf
The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf
 
Debunking Top Three Myths Holding Back Enterprise Digital Transformation.pdf
Debunking Top Three Myths Holding Back Enterprise Digital Transformation.pdfDebunking Top Three Myths Holding Back Enterprise Digital Transformation.pdf
Debunking Top Three Myths Holding Back Enterprise Digital Transformation.pdf
 
Twitter accepts Elon Musk's 44 billion USD takeover bid.pdf
Twitter accepts Elon Musk's 44 billion USD takeover bid.pdfTwitter accepts Elon Musk's 44 billion USD takeover bid.pdf
Twitter accepts Elon Musk's 44 billion USD takeover bid.pdf
 
Four Steps CIOs Can Take to Strengthen Their Position within the Organization...
Four Steps CIOs Can Take to Strengthen Their Position within the Organization...Four Steps CIOs Can Take to Strengthen Their Position within the Organization...
Four Steps CIOs Can Take to Strengthen Their Position within the Organization...
 
AWS Refocuses Its Efforts On Modern Data Strategies With New Products.pdf
AWS Refocuses Its Efforts On Modern Data Strategies With New Products.pdfAWS Refocuses Its Efforts On Modern Data Strategies With New Products.pdf
AWS Refocuses Its Efforts On Modern Data Strategies With New Products.pdf
 

Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf

  • 1. 7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 1/3 Dark Data Management: Mitigating the Risks of the Invisible Dark data is a major challenge in enterprises, and it’s not going away soon. Fortunately, there are ways to reduce dark data and the risks that come with it. Many businesses unknowingly ignore an entire category of data essential to their data protection and management policies in today’s ostensibly endless data volume and complexity. According to recent research by Veritas, Data’s Dark Side, a company’s data is typically more than 50% “dark,” or information stored in data repositories but has no assigned or established value. Dark data pose severe threats to an enterprise’s security and compliance efforts and has high storage costs, making it more crucial than ever to solve the underlying problems that lead to it. Dark data threatens protection The majority of firms are unclear about the data they must secure. Dark data reservoirs, which may house sensitive and important data, constitute a tempting target for hackers and ransomware attacks since dark data is frequently out of sight and out of mind for many companies. Clearly, understanding the data’s nature, location, and value is essential for surviving any ransomware assault. Organizations will be more successful in knowing how to safeguard data from risk and recover after an attack if they have a greater understanding of their data. Dark data threatens compliance Untagged and unstructured data makes it challenging to comply with continually changing regulatory environments. To comply with data compliance regulations, businesses may strategically implement data gathering, archiving, and surveillance capabilities. Companies will be able to adhere to strict standards and adopt retention rules throughout their whole data estate with better management of dark data. By Swapnil Mishra - July 13, 2022
  • 2. 7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 2/3 Dark data and sustainability Dark data plays a significant role in an enterprise’s environmental compliance. The environmental cost of dark data must be given attention as businesses attempt to create sustainability initiatives that will fulfill carbon reduction objectives. Companies must eliminate unnecessary data from their data centers and clouds to safeguard the environment from dark data. Enterprises have a great chance to lower their carbon footprint, adhere to industry environmental requirements, and achieve sustainability goals that are becoming more and more relevant to various stakeholders by appropriately handling dark data. Also Read: Five Trends That Will Drive the Data Center of the Future Managing and protecting dark data Dark data compromises an organization’s compliance and security. Here is how data managers can better identify, manage and protect dark data within their company: Proactive Data Management For enterprises to obtain visibility into their data, manage data-related risks, and decide which data to keep versus delete before a critical security event occurs, data officers must adapt and act from a proactive data management mindset. Data managers can implement tactics to establish a proactive mindset, are data mapping and data minimization. These tactics can discover all sources and locations of collected and stored data, reduce the amount of data being stored and confirm that retained data is directly related to the purpose in which it was collected. Using Technology Advancements Businesses could benefit from technological improvements as well. Large pools of untagged, unstructured data may be efficiently identified, managed, and protected due to Artificial Intelligence (AI) and Machine Learning (ML), which also play a crucial part in data management procedures. To ensure that sensitive or risky data is correctly managed and safeguarded, regardless of where it resides, the ultimate goal is to collect the information, not just the data, at the source (edge). This can be accomplished by fast scanning, labeling, and classifying information. As a result, by identifying vulnerabilities and mitigating risks, transparent AI and ML rules assist enterprises in gaining complete visibility into their data. The next frontier is that. By lowering costs and enabling actions through untapped intelligence, properly managed dark data provides enterprises with a safer and more compliant future. It also opens up opportunities for organizational optimization and innovation within any company. Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google News Enterprisetalk News. 
  • 3. 7/15/22, 12:55 AM Dark Data Management: Mitigating the Risks of the Invisible - EnterpriseTalk https://enterprisetalk.com/featured/dark-data-management-mitigating-the-risks-of-the-invisible/ 3/3 Swapnil Mishra Swapnil Mishra is a Business News Reporter with OnDot Media. She is a journalism graduate with 5+ years of experience in journalism and mass communication. Previously Swapnil has worked with media outlets like NewsX, MSN, and News24. 