10 Tips for Taking Back Control of Your Data

 
 
By Karen A. Frenkel  |  Posted 03-13-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Ask About Your Network Design
    Next

    Ask About Your Network Design

    Ask the cloud providers and developers who will configure your virtual networks on cloud platforms and how the network is designed. Gain assurance that your data isn't just thrown into the cloud.
  • Previous
    Learn About Cloud Data Encryption
    Next

    Learn About Cloud Data Encryption

    Get familiar with data-centric security tools that work in and outside the enterprise walls, in particular, cloud data encryption.
  • Previous
    Key Ownership
    Next

    Key Ownership

    When it comes to encryption of data at rest in a cloud environment, pay attention to who owns the keys and where those keys reside.
  • Previous
    Policy Across Cloud Services
    Next

    Policy Across Cloud Services

    Develop a security platform that allows the enterprise to implement a consistent policy across multiple cloud services, preferably one that does not involve complex key management.
  • Previous
    Data In-Use
    Next

    Data In-Use

    Data in-use is, effectively, the data that has been loaded into a process and is in the memory of the program that is running. They're in the clear while being processed and not protected by in-cloud based encryption that the cloud service provider uses. Make sure you own the entire encryption process of this data.
  • Previous
    Tokenization for Protecting Cloud Data
    Next

    Tokenization for Protecting Cloud Data

    Consider tokenization as a means of protecting cloud data. Although it's in the news mostly as a way to protect payment-related data, such as Apple Pay, large enterprises use tokenization more broadly to secure all sorts of data in the cloud.
  • Previous
    Control Mobile Data Flow
    Next

    Control Mobile Data Flow

    Data flows will bypass desktops and be processed and stored exclusively on mobile devices such as tablets and phones, so take control of mobile data flow.
  • Previous
    Preserve Cloud Application Functionality
    Next

    Preserve Cloud Application Functionality

    When choosing a cloud security solution, be sure to select one that takes full advantage of cloud SaaS functionality without compromising user functionality and still maintaining the strongest possible security and data control.
  • Previous
    Check Out Legal and Regulatory Requirements
    Next

    Check Out Legal and Regulatory Requirements

    Understand what legal and regulatory data compliance requirements there are for the types of data being stored in the cloud. Ask who is responsible for ensuring that legal and regulatory data compliance and privacy laws are addressed.
  • Previous
    Examine Contracts and Data-Sharing Methods
    Next

    Examine Contracts and Data-Sharing Methods

    Look at your business contracts, the method of sharing data with your business customers, and consider the types of information exchanged. Sensitive information and intellectual property may require certain treatment. Industries, such as banking and health care, have specific legal and regulatory restrictions and protections.
 

In an increasingly mobile world, more mobile data is being housed in the cloud, which has resulted in some serious security breaches. In 2014, for example, breaches regarding under-clothed celebrities dominated headlines. This year, organizations will need to ensure that enterprise data on mobile devices and in the cloud isn't "over-exposed," said Perspecsys CMO Gerry Grealish. Enterprises now allow employees to bring their own devices to work, and theft and loss of these devices have become major concerns for enterprises. But now, they also must wrest control of their companies' data in the cloud. Grealish outlines his tips for how CIOs can safeguard and regain control of data. Among the topics he looks at are network design, encryption, key ownership, data-in use and tokenization. Perspecsys is a provider of cloud data protection solutions.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...