DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > Data Security Challenges: How Are Those Addressed?

Data Security Challenges: How Are Those Addressed?

Most of the organization's data security strategies are to stay around external threats. Internal threats are never considered seriously.

J G user avatar by
J G
·
Feb. 06, 21 · Security Zone · Opinion
Like (4)
Save
Tweet
4.98K Views

Join the DZone community and get the full member experience.

Join For Free

In the last 20 years, the world has seen greater technology transformation. We are in the digital era now. The advanced technology innovations enabled us to automate making it impossible to possible. We have seen driverless cars, deliveries by drone, tourism to space, and many more are lined up to surprise us every day. Imagine a security leakage and the impact it could create.

In the era of digital, security plays a vital role. Cyber attacks are increased over the period in line with the upgraded technology. As a result, existing organizations had to shut down their operations, and new organizations evolved. The C-team has started allocating considerable budgets to tackle the security issues. Many products evolved to deal with such security threats. 

In a broader view, I see security in two ways. One way is network security and the other way is data security.  Within these two categories, the threats can be coming from either external or internal. This article focuses on internal data security to be specific. 

Most of the organization's data security strategies are to stay around external threats. Internal threats are never considered seriously. Internal threats originate within the organization either by the current or former employees. Such insider attacks can be by sharing the critical account passwords, sharing files and documents with external users, and so on. It is the hardest part of this issue to tackle. 

Let us look at how organizations are solving this issue today:

Employee Adherence to Security Measures

Organizations tackle this issue by providing rigorous compliance training to their employees and take written binding agreements to tackles these issues. This is more of preaching rather than enforcing with automation. Such preventive measures can't stop any leakages. 

Data Distribution Beyond the Organization

Organizations use VPNs to protect any data access beyond the organization's network. This is the most used technique to restrict anyone to access applications beyond the VPN connection. But such a technique cannot restrict the user to access the required data.

Restrictions in Accessing Data

Organizations build applications to control the authorized data. Even though it is the best suitable way to control data access, It adds a lot of overhead to the application development and ensures of same restrictions for every new application.

Data security

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How to Build Microservices With Node.js
  • Five Tips to Fasten Your Skewed Joins in Apache Spark
  • Event-Driven Microservices?
  • Which JVM Version Is the Fastest?

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo