https://www.engineeringnews.co.za
Africa|Automation|Environment|SECURITY|Storage|Technology|Solutions
Africa|Automation|Environment|SECURITY|Storage|Technology|Solutions
africa|automation|environment|security|storage|technology|solutions

Keeping it Private: How to Protect Your Data from Privacy Breaches

28th January 2022

     

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

By Kate Mollett, Regional Director at Commvault Africa

Today is Data Privacy Day and as we navigate the recently implemented Protection of Personal Information Act (PoPIA), the stakes have never been higher in today’s world of data sprawl, data security threats, and increasing data regulations.

Bad actors, human error, ransomware and other security threats pose risks to data every minute of every day, while a more stringent regulatory environment is forcing organisations to enforce compliance – or risk fines. And as data increases in volume and sprawls across applications and storage, all of these efforts become increasingly complicated.

Let’s take a look at some key principles of data privacy:

Protection & Recovery: One important area in ensuring data privacy is making sure that your data is protected. This includes the ability to recover data in the event of accidental deletion – and in the case of a malware or ransomware attack. Making sure you can recover your data in these scenarios mitigates the impact of some of these worst case scenarios.

Access & Prioritisation: Once you have a protection mechanism deployed, ensuring that sensitive data and personally identifiable information (PII) is locked down tight and only accessible by the right actors is an important safeguard you can put into place. Prioritising the protection of sensitive data, including PII, using technology such as AI/ML, reduces the risk of exposure, while automation helps take the risk of human error out of the equation. Automation can also extend to detecting anomalous data access, raising that red flag so that you can step in and protect key data before it is compromised.

Compliance & Governance: Ultimately, all of the actions above can combine to appropriately address compliance with key data regulations and help define your overall data governance regime, taking global scope and regional nuances into account. 

This may sound simple but getting data privacy right can be incredibly complex. Let’s talk about some things you can do to make ensuring data privacy easier.

Manage data sprawl. Data growth and an increasing number of data sources and repositories continue to challenge enterprise data management, with no end in sight. But there are some things you can do to mitigate this, including taking a look at the number of tools that you’re using to manage data across your environment, breaking down data silos in the process. This blog by Commvault’s Don Foster goes into further detail about what data sprawl is and how to help solve for it.

Take a comprehensive approach to data management. The principles mentioned above require a number of different data management capabilities – including data protection, data security, data compliance and more, and that make use of advanced techniques with AI/ML as well. Look for data management platforms and solutions that provide deep capabilities in all of these areas.

Simplify your environment. Let’s face it—most companies have many, many vendors, some of which do the same or similar things, and all of which have access to your data. By scaling back the number of trusted vendors and streamlining deployments, you can capture efficiencies and mitigate risk. And by introducing a single data management platform, you can simplify the user experience and reduce errors related to data privacy, and help allow your data to work for you instead of against you.

Edited by Creamer Media Reporter

Comments

Showroom

John Deere (Pty) Ltd
John Deere (Pty) Ltd

In 1958 John Deere Construction made its first introduction to the industry with their model 64 bulldozer.

VISIT SHOWROOM 
Booyco Electronics
Booyco Electronics

Booyco Electronics, South African pioneer of Proximity Detection Systems, offers safety solutions for underground and surface mining, quarrying,...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.063 0.115s - 162pq - 2rq
Subscribe Now