Global Threats: Data Protection for Local Data

Share post

Ransomware attacks, data stealer attacks, exploits for vulnerabilities: Even if the attacks are global, they are aimed at local, partly decentralized data storage. Here it is important to rethink data protection and use other solutions.

The Federal Office for Security and Information Technology (BSI) recorded 68 successful ransomware attacks, i.e. an average of more than one success for cyber criminals per week, in 2023. In the IT Security Germany 2023 management report, the BSI reports an average of 2000 new vulnerabilities in software products per year A quarter of a million new malware variants every month and every day. However, alongside the threats, data protection laws are constantly evolving.

The environment is difficult for data protection officers and cybersecurity experts and companies should continuously adapt their processes and IT structure. In an emergency, there is not only a risk of damage and operational downtime due to attacks, but also high fines for violations of the GDPR, the Federal Data Protection Act or industry-specific regulations.

Protecting data means understanding data flows

Data protection and security experts face a similar challenge on both fronts: threats are global and encountering increasingly local, decentralized data storage. New approaches are needed here. The prerequisite for protecting your own data is: understanding your own data flows, keeping the entire IT infrastructure up to date and working closely with partners. Mandy Andress, CISO at Elastic, explains: “As privacy – and control of data – becomes more of a focus, protecting personal data while adapting to new technologies and data processing methods should be a top priority. Data protection regulations have existed in Europe and the UK for some time, and are increasingly being introduced and expanded around the world. The same applies in the area of ​​security: protecting privacy and adhering to compliance requirements are becoming increasingly important in order to ensure data security.

Privacy compliance starts with understanding your data flows and keeping your directories up to date, especially as modern environments become more complex and decentralized. This also applies to third-party risk management. Companies should work with their vendors to ensure both sides approach data security in the same way as partnerships and integrations become more ubiquitous.

...adhering to compliance requirements is becoming increasingly important, says Mandy Andress, CISO at Elastic

🔎 Comment from Mandy Andress, CISO at Elastic (Image: Elastic).

Additionally, data sovereignty is an increasingly important aspect of data protection, presenting new challenges for teams to maintain holistic transparency and analysis while still keeping data at its geographical origin. As threats become more global and data becomes more local, we must find new ways to balance these conflicting perspectives. At Elastic, this means providing users with a foundational IT architecture that allows them to have full legal control over their data in the country in which they are located, while at the same time enabling their analytics on all of their data expand worldwide.”

Data decentralized, analysis and protection everywhere

It is fundamental for companies to establish a forward-looking and flexible data protection strategy. Understanding your own data flows plays a central role: Where is data located and where is it used? Your own IT infrastructure should enable cross-location analysis of internal data, support storage at the geographical origin and at the same time ensure data protection.

More at Elastic.co

 


About Elastic

Elastic is a leading platform for search-based solutions. Elastic knows that it's not just about the data, but also about the answers. With the Elasticsearch platform, anyone can find the answers they need - in real time and using the entire database, no matter how large it may be. Elastic delivers complete, cloud-based, AI-powered enterprise security, observability, and search solutions based on the Elasticsearch Platform, a development platform already used by thousands of companies, including more than 50% of the Fortune 500.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more