For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But what happens when an unhappy employee moves high-value information onto a USB drive or sends an important email attachment outside the “secure” network? Those walls crumble the moment they're needed the most.
Ryan Francis recently compiled a list of 6 Shocking Gaps in Your Data Security Strategy for CSO Online. As he notes, every year billions of dollars are invested in cybersecurity, but data breaches continue to pile up. This comes down to a basic failure in security strategy: the walled approach to data security is crumbling down.
Where are the gaps in your security strategy? Francis outlines them this way:
The walled garden approach to data security is not working. Instead of putting walls around the perimeters, which keep expanding anyway, focus instead on the data. As we’ve laid out in a previous article, a data-centric security strategy begins by defining you data and limiting access. Absolute provides unprecedented visibility and control over your endpoints and the data they contain. With our automated alerts, you can watch for suspicious device or user activity, and take steps to contain a security incident before it becomes a data breach. Learn more at Absolute.com