How to Close the Gaps In Your Security Strategy
How to Close the Gaps In Your Security Strategy

For years, organizations have been secured like fortresses, building walls around networks, applications, storage containers, and devices. But what happens when an unhappy employee moves high-value information onto a USB drive or sends an important email attachment outside the “secure” network? Those walls crumble the moment they’re needed the most.

Ryan Francis recently compiled a list of 6 Shocking Gaps in Your Data Security Strategy for CSO Online. As he notes, every year billions of dollars are invested in cybersecurity, but data breaches continue to pile up. This comes down to a basic failure in security strategy: the walled approach to data security is crumbling down.

Where are the gaps in your security strategy? Francis outlines them this way:

  • The behavior gap – human error and the insider threat
  • The visibility gap – after data goes outside the traditional “walls,” organizations lose the ability to see when, where or how the information is being used. As much as 45% of corporate data is already on the endpoint, often with no visibility
  • The control gap – as data slips into the Shadow, organizations lose the ability to control it
  • Response time gap – technologies are often brought into the workplace and used long before security is a consideration
  • The mobile gap – most security solutions for the endpoint are easily circumvented, if present at all
  • The content gap – confidential information is being created in more file formats than ever, so security must play catch up to encompass them all

The walled garden approach to data security is not working. Instead of putting walls around the perimeters, which keep expanding anyway, focus instead on the data. As we’ve laid out in a previous article, a data-centric security strategy begins by defining you data and limiting access. Absolute provides unprecedented visibility and control over your endpoints and the data they contain. With our automated alerts, you can watch for suspicious device or user activity, and take steps to contain a security incident before it becomes a data breach. Learn more at Absolute.com