ERP News

Cyber Security: Build Data Protection Strategy

423 0

As the technology grows in an organization, the risk to data security also rises.The organization needs to secure their data by using some protection.  Cyber intrusions and attacks have increased dramatically over the last decade – both in frequency and in sophistication – exposing sensitive personal and business information, disrupting critical operations, and imposing high costs on the economy. Over the next few years, cyber crime attacks are expected to cost as much as $3 trillion in lost economic value.

Recently, many data security breaches have impacted large corporations globally. It should be highlighted that enterprises of all sizes can be targets of data breaches; small and mid-size businesses are in the crosshairs as well and need to protect against data security threats. “To secure data, an important step that many miss out is to create an extensive data security plan in order to understand on what data could be at risk. Enterprise data must be secured through authorized and controlled access, and virtualization enables this security model as it allows one to have a secure architecture and orchestrate control throughout the infrastructure,” says Mahesh Nayak, the Chief Operating Officer, SAP Labs India.

According to Muthu Raja Sankar, Managing Director, Accenture Security, many enterprises do not have sufficient capabilities to proactively identify, understand and respond to incidents that threaten the security of their data. This includes threats and exposures that they may face within the enterprise as well.

At Accenture Security, they believe enterprises can be successful in addressing this by following a three-phased approach:

Build a data protection strategy: Every enterprise needs a strategic vision for data protection, and an actionable roadmap for implementation and a thorough assessment of compliance requirements. This will ensure a strong foundation to understand and identify critical information, current data protection capabilities, and identify potential opportunities and remediation areas.

Read More Here

Article Credit: DQ

Leave A Reply

Your email address will not be published.

*

code