SlideShare a Scribd company logo
1 of 11
Data in rest
• Data at rest is a term that refers to data stored on a
device or backup medium in any form
• It can be data stored on hard drives, backup tapes, in
offsite cloud backup, or even on mobile devices
• What makes it data at rest is that it is inactive data that
is not currently being transmitted across a network or
actively being read or processed
• Data at rest is typically in a stable state
• It is not traveling within the system or network, and it
is not being acted upon by any application or the CPU
Data in rest
• Data at rest is data that has reached a
destination (even if only temporarily)
• At this destination, there can be additional
layers of security added to it, such as
encryption, multi-factor authentication, and
both digital and physical access controls
• Data at rest should almost always be
encrypted
Data in motion
• Data in motion is data that is currently traveling across
a network or sitting in a computer’s RAM ready to be
read, updated, or processed
• Data crossing over networks from local to cloud
storage or from a central mainframe to a remote
terminal should be encrypted so that it cannot be read
or manipulated by any machine or hacker between the
data’s source and destination
• This data in motion includes data moving across a
cables and wireless transmission
• It can be emails or files transferred over FTP or SSH.
Data in use
• Data in use is data that is not just being stored
passively on a hard drive or external storage
media
• This is data that is being processed by one or
more applications
• This is data currently in the process of being
generated, updated, appended, or erased
• It also includes data being viewed by users
accessing it through various endpoints
Data in use
• Data in use is susceptible to different kinds of
threats depending on where it is in the system
and who is able to use it
• The most vulnerable point for data in use is at
the endpoints where users are able to access
and interact with it
Data in use
• Protecting data in use is a challenging task since
there is such variety in the ways the data can be
accessed and manipulated
• One set of data can potentially have multiple
users working with it from multiple endpoints
• The large number of in-house systems, devices,
and employees accessing mainframe data from
personal devices means this data should be
protected through strong user authentication,
identity management, and profile permissions
Security measures for data
• Implement robust network security controls to
help protect data in transit
• Network security solutions like firewalls and
network access control will help secure the
networks used to transmit data against malware
attacks or intrusions
• Don’t rely on reactive security to protect your
valuable company data
• Instead, use proactive security measures that
identify at-risk data and implement effective data
protection for data in transit and at rest
Security measures for data
• Choose data protection solutions with policies
that enable user prompting, blocking, or
automatic encryption for sensitive data in transit
• Create policies for systematically categorizing and
classifying all company data, no matter where it
resides
• This is required to ensure that the appropriate
data protection measures are applied while data
remains at rest and triggered when data classified
as at-risk is accessed, used, or transferred
Security measures for data
• If you utilize a public, private, or hybrid cloud
provider for storing data or applications,
carefully evaluate cloud vendors based on the
security measures they offer – but don’t rely
on the cloud service to secure your data
• Who has access to your data, how is it
encrypted, and how often your data is backed
up are all imperative questions to ask
Security measures for data
• While data in transit and data at rest may have slightly
different risk profiles
• The inherent risk hinges primarily on the sensitivity and
value of your data
• Attackers will attempt to gain access to valuable data
whether it’s in motion, at rest, or actively in use,
depending on which state is easiest to breach
• That’s why a proactive approach including classifying
and categorizing data coupled with content, user, and
context-aware security protocols is the safest and most
effective way to protect your most sensitive data in
every state

More Related Content

Similar to rest motion.pptx

Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at dataSanjeev Solanki
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxdotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxTechnocracy2
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptxams1ams11
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - finalchrisdown68
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptxAwais725629
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptxAwais725629
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxnikitasoam7781
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at dataSanjeev Solanki
 

Similar to rest motion.pptx (20)

Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - final
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Ch01 NetSec5e.pdf
Ch01 NetSec5e.pdfCh01 NetSec5e.pdf
Ch01 NetSec5e.pdf
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Ch01 NetSec5e.pptx
Ch01 NetSec5e.pptxCh01 NetSec5e.pptx
Ch01 NetSec5e.pptx
 
information security.pptx
information security.pptxinformation security.pptx
information security.pptx
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptx
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 

More from GayathriSanthosh11

privacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptxprivacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptxGayathriSanthosh11
 
Public key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxPublic key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxGayathriSanthosh11
 
rough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingrough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingGayathriSanthosh11
 
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptxGayathriSanthosh11
 
10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptxGayathriSanthosh11
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptGayathriSanthosh11
 
09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptxGayathriSanthosh11
 

More from GayathriSanthosh11 (11)

privacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptxprivacy preserving forenciscs of encyrpted data.pptx
privacy preserving forenciscs of encyrpted data.pptx
 
Public key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptxPublic key infrastrucure and its uses.pptx
Public key infrastrucure and its uses.pptx
 
rough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision makingrough intro about xai and the uses of xai in decision making
rough intro about xai and the uses of xai in decision making
 
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
2019-08-08-OriginStamp-Blockchain-Technology-Presentation.pptx
 
273CC03851E778670A (1).ppt
273CC03851E778670A (1).ppt273CC03851E778670A (1).ppt
273CC03851E778670A (1).ppt
 
10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx10.1098-rsos.190023Figure1900232.pptx
10.1098-rsos.190023Figure1900232.pptx
 
Deep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.pptDeep-Learning-2017-Lecture7GAN.ppt
Deep-Learning-2017-Lecture7GAN.ppt
 
Untitled 6.pptx
Untitled 6.pptxUntitled 6.pptx
Untitled 6.pptx
 
Lecture_3.pptx
Lecture_3.pptxLecture_3.pptx
Lecture_3.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx09092019-Block.one-Presentation.pptx
09092019-Block.one-Presentation.pptx
 

Recently uploaded

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfKira Dess
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfragupathi90
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentationsj9399037128
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 

Recently uploaded (20)

litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 

rest motion.pptx

  • 1.
  • 2. Data in rest • Data at rest is a term that refers to data stored on a device or backup medium in any form • It can be data stored on hard drives, backup tapes, in offsite cloud backup, or even on mobile devices • What makes it data at rest is that it is inactive data that is not currently being transmitted across a network or actively being read or processed • Data at rest is typically in a stable state • It is not traveling within the system or network, and it is not being acted upon by any application or the CPU
  • 3. Data in rest • Data at rest is data that has reached a destination (even if only temporarily) • At this destination, there can be additional layers of security added to it, such as encryption, multi-factor authentication, and both digital and physical access controls • Data at rest should almost always be encrypted
  • 4. Data in motion • Data in motion is data that is currently traveling across a network or sitting in a computer’s RAM ready to be read, updated, or processed • Data crossing over networks from local to cloud storage or from a central mainframe to a remote terminal should be encrypted so that it cannot be read or manipulated by any machine or hacker between the data’s source and destination • This data in motion includes data moving across a cables and wireless transmission • It can be emails or files transferred over FTP or SSH.
  • 5. Data in use • Data in use is data that is not just being stored passively on a hard drive or external storage media • This is data that is being processed by one or more applications • This is data currently in the process of being generated, updated, appended, or erased • It also includes data being viewed by users accessing it through various endpoints
  • 6. Data in use • Data in use is susceptible to different kinds of threats depending on where it is in the system and who is able to use it • The most vulnerable point for data in use is at the endpoints where users are able to access and interact with it
  • 7. Data in use • Protecting data in use is a challenging task since there is such variety in the ways the data can be accessed and manipulated • One set of data can potentially have multiple users working with it from multiple endpoints • The large number of in-house systems, devices, and employees accessing mainframe data from personal devices means this data should be protected through strong user authentication, identity management, and profile permissions
  • 8. Security measures for data • Implement robust network security controls to help protect data in transit • Network security solutions like firewalls and network access control will help secure the networks used to transmit data against malware attacks or intrusions • Don’t rely on reactive security to protect your valuable company data • Instead, use proactive security measures that identify at-risk data and implement effective data protection for data in transit and at rest
  • 9. Security measures for data • Choose data protection solutions with policies that enable user prompting, blocking, or automatic encryption for sensitive data in transit • Create policies for systematically categorizing and classifying all company data, no matter where it resides • This is required to ensure that the appropriate data protection measures are applied while data remains at rest and triggered when data classified as at-risk is accessed, used, or transferred
  • 10. Security measures for data • If you utilize a public, private, or hybrid cloud provider for storing data or applications, carefully evaluate cloud vendors based on the security measures they offer – but don’t rely on the cloud service to secure your data • Who has access to your data, how is it encrypted, and how often your data is backed up are all imperative questions to ask
  • 11. Security measures for data • While data in transit and data at rest may have slightly different risk profiles • The inherent risk hinges primarily on the sensitivity and value of your data • Attackers will attempt to gain access to valuable data whether it’s in motion, at rest, or actively in use, depending on which state is easiest to breach • That’s why a proactive approach including classifying and categorizing data coupled with content, user, and context-aware security protocols is the safest and most effective way to protect your most sensitive data in every state