I’m very excited to share a new infographic we just produced on privacy and data protection. It’s no surprise
that organizations around the world are struggling with how to reduce the risk of a data breach. According to a recent IBM study, 60% of breaches coming from insiders. And part of that may be attributable to the fact that, according to a recent Harvard study, 70% of employees have access to data that they shouldn’t.
It’s a privacy and security obligation that organizations protect their sensitive data. Yet at the same time, it’s a competitive imperative that information is put in the hands of customers and decision-makers.
How do organizations manage the sharing and protection of information? That’s the subject of this infographic. Moreover, we present five components to help organizations share data responsibly.
- Mask Direct Identifiers with Dynamic Privacy Controls: Real-time access to identified or masked data based on policy-driven user authentication.
- Apply Risk-Based De-Identification with Persistent Access Controls: Build de-identified datasets where the risk of re-identification is calculated and data is transformed to meet risk threshold.
- Enforce Zones of Trust to Control Data Proliferation: Ensure sensitive data doesn’t leak to uncontrolled environments such as portable devices.
- Generate Detailed Compliance Reports to Track Sensitive Assets: Document de-identification process and inventory data proliferation including right to be forgotten and personal information retention.
- Maintain Fine-Grained Audit Logs to Identify Unauthorized Access: Log user activity and access to sensitive data, alerting anomalous patterns.
We’d love to hear what you think. And if you’d like to hear more about what we do, please reach out to us at firstname.lastname@example.org.