Skip to main content

Data Protection: Knowing is Half the Battle

by Bill Bradley on Friday February 24, 2017

Contact Us
Free Demo
Chat

Part two in our blog series on The Definitive Guide to Data Classification discusses the growing data deluge, what analysts are saying about security strategy, and how classification can bring order to your digital world.

A certain fictional character is known to have said “Knowing is half the battle.” Who knew all these years later that statement would still be relevant and tied to something like data classification and information security? When it comes to data protection, an understanding of what you are protecting is key to success. Analyst firm IDC estimates the digital universe if growing at ~40% year over year. Search for the term “digitization” and you’ll see McKinsey, PricewaterhouseCoopers, and the Harvard Business Review in the results; it simply means that more data is in electronic form. What that also means is there is more digital data to protect. Data classification allows you to tailor your data protection strategy to what is most important to your business, despite this 40% annual increase in the volume of data created.

The analyst firms, too, are fielding calls from their customers about protecting the increasing volume of data and recommending data classification as a way to put order to the chaos. Gartner and Forrester both call data classification a foundational element of a data protection strategy. The broad efficacy of classification delivers benefits across the information security stack, hence the importance these firms place on classification. It serves to put a line in the sand around what is and what isn’t critical to continued business operations.

Need more? While classification was once targeting insider threats, now it defends against both insider and outsider threats. With data classification in place as part of your data protection program:

  • Files that are classified as sensitive either can’t be attached to emails or won’t go to unauthorized recipients (such as that random address that Outlook incorrectly auto-populated), preventing the insider-based intentional or inadvertent data loss incident.
  • Company networks are under a steady stream of attacks, ranging from the opportunistic to the targeted. When these attacks go after sensitive data, per your data classification program, alerts are escalated to prompt either automated actions or the attention of the infosec team.

Somewhere buried in an enterprise’s data are:

  1. CAD files with proprietary manufacturing details
  2. Photos of the booth from the last trade show
  3. Merger and acquisition plans
  4. Archived press releases
  5. Pre-release earnings information

Without data classification, they all look the same to your data security program; with data classification you can see what should be treated with high security and what documents are safe for public exposure. You achieve focus, clarity of mission, and efficiency.

For more information about how data classification can improve your data security program download the entire eBook, The Definitive Guide to Data Classification.

Read more in our Definitive Guide to Data Classification Series

  1. Getting Started with Data Classification
  2. Data Protection: Knowing is Half the Battle
  3. How Should You Classify Your Data? A Guide to Using Context-, Content-, and User-Based Data Classification Effectively
  4. Selling Data Classification to the Business: 3 Tips for Getting Organizational Buy-In
  5. Setting Yourself Up to Win: Guidance for Data Classification Success

Tags:  Data Classification

Recommended Resources

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention

All the essential information you need about DLP in one eBook.

6 Cybersecurity Thought Leaders on Data Protection
6 Cybersecurity Thought Leaders on Data Protection

Expert views on the challenges of today & tomorrow.

Digital Guardian Technical Overview
Digital Guardian Technical Overview

The details on our platform architecture, how it works, and your deployment options.