Managing Your Big Data Security Strategy in 2017

Harpreet Singh Harpreet Singh
July 28, 2017 Big Data, Cloud & DevOps
Need training for Big Data? Browse courses developed by industry thought leaders and Experfy in Harvard Innovation Lab.
In the era of Big Data, as the amount of data available for analysis has exploded exponentially, securing that data has become absolutely essential for corporate success. Firms like Target and Home Depot and political entities like the Democratic National Committee know first hand the deleterious impact that data breaches can have on the corporate brand and bottom line. While the businesses are impacted in different ways, it is the consumers of these businessess who almost always suffer the consequences. To see how data breaches have impacted you personally, you can go to HaveIBeenPwned and enter your email address to identify where your identity has been compromised. If you have been around the Internet block for a while, you are almost certain to find yourself on the list.
Achieving corporate data security requires attention to several basic but essential principles:
  1. Have a Comprehensive Strategy: Data security has several interrelated elements: hardware, security software, network infrastructure, organizational leadership, and policies governing personnel recruitment, training and data access. The best firms do not approach these elements as silos but treat them holistically with an integrated strategy. For example, you can have the best hardware but if your network infrastructure or security software are obsolete, data can easily be corrupted or stolen. Likewise, human error, personnel policies and poor leadership are critical parts of data security. Employees do steal or if poorly trained are unable to intervene effectively to address data threats. Many data breaches are the result of laptops being stolen from a home that had private customer data on them so policies governing the use of laptops are essential. Weakness in any element of data security can corrupt the entire system.
  2. Use Hadoop Intelligently: Hadoop has emerged as a powerful tool for storing large amounts of data but because it runs in non-secure mode by default, it is essential to be up-to-date on security and data governance offerings. Cloudera, Hortonworks and MapR have emerged as major Hadoop distribution providers with strong security solutions in the areas of authentication, authorization, and encryption so remaining abreast of the best-in-class Hadoop security tools is vital. The last thing you want to do is to aggregate, perhaps, your most valuable asset (i.e. data) in a Big Data envionment and give others the ability to hack it and take away your competitive advantage.
  3. Backup Data: Hardware fails. It is a simple fact of life. The only way for those failures not to be catastrophic is for your data to be regularly backed up, whether in the cloud or in your server farms. Aside from the obsolescence that is intrinsic to all hardware, there is the constant threat of theft and the increasingly important threat that climate change-induced disasters–floods, hurricanes, fires–pose to data. Regularly backing up data gives you the best chance to overcome those technological, criminal and natural threats.
  4. Create a Security Checklist Specific to Your Organization: All organizations are different and have distinct data security needs based upon their industry. Those needs impact the database technologies that they utilize and their data priorities. For example, NoSQL databases are used in industries where horizontal scaling and real-time applications are critical. MongoDB, a key NoSQL provider, offers an excellent security checklist that can be adapted for the specific needs of your organization. The same is true with relational databases and increasingly popular cloud-based file sharing technologies. The introspective act of senior leadership, the IT division and various corporate units working together to develop a security checklist can provide the best security firewall of all: democratic engagement throughout the firm in making data security a top priority.
  5. Update Data Security Components Regularly: Data security is an organic problem as threats are constantly evolving. Hardware, network infrastructure, internal policies and especially security software should be regularly updated to adapt to the ever-changing threat landscape. This can be an enormous challenge but Experfy is developing a suite of Big Data Readiness Indexes that can help you in this regard by keeping you abreast of latest developments and the best solutions for securing data.
For related Risk Management strategies, see Experfy’s Fraud and Risk Practice areas.
  • Experfy Insights

    Top articles, research, podcasts, webinars and more delivered to you monthly.

  • Harpreet Singh

    Tags
    Fraud & Risk
    © 2021, Experfy Inc. All rights reserved.
    Leave a Comment
    Next Post
    Claims Severity Prediction with Apache Spark 2.0 and Scala

    Claims Severity Prediction with Apache Spark 2.0 and Scala

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    More in Big Data, Cloud & DevOps
    Big Data, Cloud & DevOps
    Cognitive Load Of Being On Call: 6 Tips To Address It

    If you’ve ever been on call, you’ve probably experienced the pain of being woken up at 4 a.m., unactionable alerts, alerts going to the wrong team, and other unfortunate events. But, there’s an aspect of being on call that is less talked about, but even more ubiquitous – the cognitive load. “Cognitive load” has perhaps

    5 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    How To Refine 360 Customer View With Next Generation Data Matching

    Knowing your customer in the digital age Want to know more about your customers? About their demographics, personal choices, and preferable buying journey? Who do you think is the best source for such insights? You’re right. The customer. But, in a fast-paced world, it is almost impossible to extract all relevant information about a customer

    4 MINUTES READ Continue Reading »
    Big Data, Cloud & DevOps
    3 Ways Businesses Can Use Cloud Computing To The Fullest

    Cloud computing is the anytime, anywhere delivery of IT services like compute, storage, networking, and application software over the internet to end-users. The underlying physical resources, as well as processes, are masked to the end-user, who accesses only the files and apps they want. Companies (usually) pay for only the cloud computing services they use,

    7 MINUTES READ Continue Reading »

    About Us

    Incubated in Harvard Innovation Lab, Experfy specializes in pipelining and deploying the world's best AI and engineering talent at breakneck speed, with exceptional focus on quality and compliance. Enterprises and governments also leverage our award-winning SaaS platform to build their own customized future of work solutions such as talent clouds.

    Join Us At

    Contact Us

    1700 West Park Drive, Suite 190
    Westborough, MA 01581

    Email: support@experfy.com

    Toll Free: (844) EXPERFY or
    (844) 397-3739

    © 2025, Experfy Inc. All rights reserved.