Print Save PDF

About 4 minutes

Our to-do lists these days are full with tasks that we have to prioritize:

  • Spring cleaning: You know it’s important, but if you don’t get to it this week that’s OK.
  • Oil change: Same thing, it’s important to do it on time, but it’s not as if the engine will fall out at 500 miles over. If you let it go for a little longer, you’re still OK.
  • Data security: Your system is set up to capture, store, and review data, but you haven’t quite figured out how to approach data loss or breaches. This item is NOT OK to save for later. It needs to be moved up the list.

In the case of prioritizing big data, it is important to note that the increased ability to collect, decipher, and share data has changed the world over the last few years. From vast improvements across technology and healthcare, to new global data sharing and expanded business collaborations, big data is here to stay and organizations are adapting accordingly. As with any new development, companies need to address the security concerns that come along with big data and create secure environments that avoid and are prepared for data loss.

CIO To-Do List for Big Data Security:

shutterstock_113945947

Realize Your Data Is Valuable

Don’t ask yourself, “Why would anyone really want my data?” Instead, ask yourself, “Why not?” With the amount of personal, business, and government data collected and available, keeping it secure really does matter. “We’re undergoing a revolution in the way that information about our purchases, our conversations, our social networks, our movements and even our physical identities are collected, stored, analyzed and used,” said White House adviser John Podesta. He further explained that the value of the information generated through the use of big data is not hypothetical, and therefore, any breach could have catastrophic implications.

Master Migrations

The data migration pro stated that big-bang data migrations, where everything is moved over a weekend or overnight, is not the safe way to go anymore. This strategy may have worked prior to 2012, when the sheer amount of data started to double annually. But with the amount of data being produced now, it is impossible. 

The immense data load makes it harder for businesses to condense and migrate data volumes and to test the migration for application consistencies in such a short amount of time. The best thing to do is to plan a strategic process that prioritizes applications, condenses data sets, tests the strategy for failures and downtime, and then migrate.

Don’t Let Anybody Cut Through Your Cloud

The Cloud Security Alliance recognized the challenges for big data within the cloud in 2013. “Security and privacy issues are magnified by the velocity, volume, and variety of big data, such as large-scale cloud infrastructures.” When critical applications and data migrate to the cloud, IT teams must deliver security for larger, more complex environments or call upon cloud vendors and managed services providers that can react to the demand for higher protection. Because big data is more accessible to organizations of any size, creating secure cloud infrastructures must be a priority. 

IBM understands that big data provides unique opportunities for businesses create insights and make smarter business decisions. On a massive scale, IBM Security Intelligence with Big Data provides exposes threats, detects risk, and combines security expertise with analytical insights. By expanding upon traditional security technologies with IBM Security Intelligence, your business benefits from the capabilities and vision required to detect and protect against attacks on big data .

 

                      cfo_ebook_cta            
Written by IBM BP Network