How many data breaches need to occur before companies take real preventative action? While hotel chains, retail stores, and Facebook are likely to grab headlines, companies of all sizes, across all industries, face the same threats. If you work with intellectual property, handle sensitive materials, or are subject to regulatory compliance, you need to safeguard your digital assets.
The ideology has shifted from “if” a data breach occurs, to “when” it will occur. In 2021, more than 40 million patient records were compromised according to incidents reported to the federal government. Exacerbating the challenges faced by overcoming said data breaches, some hospitals then face legal action upon restoring their network.
Unprepared companies find themselves on newsfeeds for both negligences in combatting a breach and the resulting punishment levied by regulating bodies. Despite this, most companies trying to manage their data are using increasingly unreliable methods such as:
- Putting up a firewall around the application. Despite amazing progress with firewalls and network security, a malicious attack or internal leak (whether intentional or inadvertent) will result in compromised data.
- Using an Access Control List (ACL). Sadly, this static method of protecting who can touch data doesn’t work in today’s modern, dynamic, and globally distributed environment.
- Applying Role-Based Access Control (RBAC). Using authentication schemes, location, network, risk, and individual characteristics can work for one-time access, but today’s environment is dynamic, making RBAC impossible to keep updated.
- Locking files. Forcing users to lock and unlock files, leaving them either unprotected or inaccessible due to being locked up. This static model is an inconvenient and precarious approach in today’s dynamic work environment.
Chasing dynamic data with static security models will not support a fast-moving company. As more data becomes available for sharing across a variety of networks, these security measures are proving ineffective at stopping data breaches. Using a network, an ACL, or RBAC simply can’t stop malicious attacks or internal threats.
Even though encryption is a common method to secure files when being shared, there is no way to securely collaborate if the data shared is encrypted. Despite encryption being an effective way to lock up data, data needs to be decrypted to allow the recipient to access the shared file. As soon as a said file is decrypted, it is no longer secure, and the data can be used or retransmitted to anyone.
Enterprise Digital Rights Management (EDRM) is essentially a policy-based technique that uses encryption to protect data persistently. It provides centralized control of access to and usage of digital information regardless of where it exists- be it inside or outside of your enterprise. EDRM systems protect enterprise information from unauthorized access, use, and distribution by applying policies to the information distributed in electronic documents. EDRM policies selectively prevent document recipients from specific use activities like copying, printing, forwarding, cutting & paste, and expiration. Policies can be updated or revoked even if the document has been distributed outside the enterprise. In doing this, EDRM protects data against theft, misuse, or inadvertent disclosure, and mitigates the business, legal, and regulatory risks of collaboration and information exchanges with partners and customers.
To comment on this post
Login to NextLabs Community
NextLabs seeks to provide helpful resources and easy to digest information on data-centric security related topics. To discuss and share insights on this resource with peers in the data security field, join the NextLabs community.
Don't have a NextLabs ID? Create an account.