How do you address the risks of breach and disclosure associated with redundant, obsolete or trivial data? Credit: Thinkstock There are countless distractions that keep CIOs awake at night. Some of them – such as uptime, new technologies and budget concerns – are nothing new. Others – such as Big Data and an increased emphasis on Data Security – are newer concerns. At the intersection of Big Data and Data Security is where a new danger lurks. As the cost per gigabyte of enterprise storage continues to decrease, it has become cheaper and easier for enterprises to simply add more disk space instead of policing their existing usage; and in the process they risk losing control of their data. While most businesses know where their important data is located, they don’t always know where it isn’t. This lack of control has introduced a new risk into the enterprise, Dark Data. Traditionally, the risk profiling of primary data sources has focused on reducing the expense of discovery during litigation or a data breach. Because of this, significant effort is put into protecting these primary data stores. However, “Redundant, Obsolete or Trivial” data (often called ROT or simply Dark Data), presents new challenges to data security and governance. Redundant data can occur when copies of data exist across multiple locations. These copies aren’t always kept up to date and become obsolete from a business perspective, yet still contain significant risk. What happens when this data isn’t deleted, or migrates to other servers or data stores that don’t have the same level of protection? For instance, what risks exist when a database containing protected health information or personally identifiable information is exported from a production SQL server onto an unsanctioned temporary server with minimal security controls? An attacker that can find such a poorly defended server will compromise it and reap the same rewards as if they had compromised the primary location of that data. This data presents the very same risks of breach and disclosure as the primary data sources, and attackers have greater incentive to find them than the information owners. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe When attackers infiltrate your network, they quickly establish a foothold and backdoor to ensure they can return undetected. Then, the attackers start mapping out your network, searching for systems they can breach and data they can monetize themselves or that they can sell to other criminals. Any attacker worth his salt is going to be brutally efficient at this, and will likely end up with a unique perspective of what your network looks like. If the attackers are criminals, their focus is purely monetarily driven; what they can steal is what they can sell. If they are hacktivists with an axe to grind, they are going after anything they can use to tarnish your company’s reputation. Either way, they waste no time to locate and exfiltrate this data. So, how do you deal with the risks associated with Dark Data? Fight D’s with more D’s! Defensible Data Deletion, the process of identifying ROT data across the enterprise, is specifically designed to reduce the risks associated with this type of data. While this solution was created to reduce operational cost and eDiscovery risks associated with litigation, it works equally well to help defend your organization from the risks of breach and disclosure. First, enterprise data stores are identified and scanned for various data files such as documents, spreadsheets, etc., and a database of the location of these files is compiled. Metadata about these files is also stored, in addition to capturing a digital fingerprint of each file using an MD5 signature or similar hash algorithms. This helps to identify files that are duplicates with different filenames or other metadata. Once this is completed, redundant copies which serve no business purpose, can be deleted and removed from the environment. Additional analysis can be performed to show that files are older outdated versions, or smaller subsets of existing data, and they can be removed as well if they serve no reasonable business purpose. Failing to know where your organization’s data reside doesn’t absolve you of protecting that data. Since the risks associated with ROT data are at least on par with that of normal production data, it is extremely important to an organization to not only identify, but also to curate, prune and dispose of this data. Due to its high likelihood of being lost, forgotten and detached from its original owner, Dark Data can eventually become a cancer in your system requiring heroic efforts to eradicate. Related content opinion CEO and CIO cyber disconnect: Fixing the communications breakdown In this new business environment, to help their organizations bolster their cyber security protections and also boost their careers, CIOs must find ways to communicate more effectively and consistently with their CEOs and the board. By Tony Buffomante Aug 21, 2018 5 mins CIO IT Leadership opinion Emerging technology adoption: striking a balance between innovation and risk management Companies that are transforming themselves and enabling emerging and disruptive technologies can take four initial but concrete steps to strike the right balance between innovation and risk management. By Phillip Lageschulte Jul 20, 2018 4 mins Innovation Risk Management Emerging Technology opinion Onshore vs. offshore: 8 trends driving IT support back home When it comes to IT outsourcing, more companies are reporting plans to increase spending nearer to their own shores than u201coffshore.u201d This has several implications for CIOs and IT leaders. By Randy L. Wiele Jun 08, 2018 4 mins Technology Industry IT Skills IT Strategy opinion Comply today and realize value tomorrow: GDPR readiness day one and beyond This blog is dedicated to detailing the capabilities your organization needs to comply with General Data Protection Regulation (GDPR) and, eventually, to operationalize and enhance your privacy compliance and processes. By Tony Buffomante Apr 10, 2018 4 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe