Big data refers to the huge and ever-growing volume of data organizations mine to uncover opportunities for building deeper customer relationships and developing new strategies for growth. Gartner describes big data as having “volume” (the amount of data), “velocity” (the speed at which data flows into the organization) and “variety” (structured and unstructured). Big data can uncover big opportunities for an organization, but it can also provide a big target for cyber criminals.
Data breaches such as the hack of the U.S. Office of Personnel Management that compromised the files of tens of millions of federal employees demonstrate this risk of holding high volumes of data in a manner that does not match its sensitivity. The cost of repairing the damage, and the cost to an organization’s reputation, are too high to ignore.
White Paper: Cyber Security Best Practices - The Ethics and Compliance Effect
Understand the Surface Area of Your Data
In addition to the rapid proliferation of data, the number of digital devices connected to the global IP network has increased the surface area of risk organizations have exposed to potential hackers. This has ushered us into the current state of heightened cyber security requirements, best summed up by former CEO of Cisco John Chambers: “There are two types of companies: those that have been hacked, and those who don't know they have been hacked.”
According to a recent Cisco analysis, mobile data traffic has grown 18-fold over the past five years. Almost half a billion mobile devices were added in 2016 alone. In addition, 325 million wearable devices were reported worldwide. This wouldn’t appear to be a concern until you consider that 11 million of these new wearables have embedded cellular connections. The ubiquity of personal devices has made their usage, and their vulnerabilities, a new part of the modern workplace.
Each employee increases the amount of data an organization must protect. Each device an employee uses to access that data represents a chink in the armor which attackers can compromise.
Toolkit: Cyber Security Awareness Kit