Select your language

3 security measures that strengthen Big Data

Mexico. The use of Big Data solutions is increasingly disseminated by different organizations after making a fairly relevant decision around information security, especially in how it interferes with the use of that data and how companies themselves are preparing for the demands of this new scenario.

According to the company Comstor, many times organizations do not associate that information security can only exist in the use of Big Data if there is an integration of actions for risk prevention. There is no point in just redefining IT processes to deal with large amounts of data if the company is not attentive to the security processes that help keep the organization's data safe.

That happens because there is little control over the gigantic mountain of generated data that is influencing the foundations of institutions on a daily basis. Having as a prerogative that big data can come from anywhere and assume various formats, all care is little. And many of today's technology solutions for data processing do not enable minimum security requirements during product installation. Some only require a registration or password to access the data storage premises.

Another important fact in this context is the exposure of data on the network and even the compromise of the databases from exclusions, modifications or the sharing of information. A fairly frequent example today is the movement of traditional data services for the large data market using the Cloud environment. That way, once large amounts of data are stored in the Cloud, it is necessary to have adequate security measures for that data.

- Publicidad -

The task of CIOs is to make data security a high priority. In this way, Comstor makes some suggestions that can strengthen The Governance of Big Data:

1.- Priority security controls
The biggest security flaws in Big Data solutions are precisely in the lack of authentication mechanisms. These can be characterized from the absence of user records and passwords, to the lack of secure channels for access to databases, such as the use of cryptography. In this context, the figure of a security manager would be quite useful in the definition of security policies, both to validate requirements necessary for data protection when training internal teams that deal with those solutions focused on information security, in addition to the eventual validation of external security teams, through consultancies.

Among other measures that can be adopted in Big Data projects, are the adaptation to the rules and laws, control of access to the most strategic information, selection of the information available in the data environment and review of authenticity of the information, with guaranteed origin. Finally, using data masking can be an interesting way to write sensitive data items so that that data is not shared with people outside the company.

2.- Review of user access control to databases.
Periodically, the IT manager or the information security manager must review the data access permissions in the company's repositories. This can be done every six months or every year, and all levels of users in the organization must be reviewed, adjusting access permissions based on work responsibilities. An important recommendation: when employees leave the company, they should be immediately removed from access.

3.- Monitoring of user behavior
All the measures mentioned above are useless if the user does not follow the safety regulations. Therefore, the constant monitoring of that public is of the utmost importance. Monitoring the access habits of users can generate behavioral models that will have important information about how, when and how often a person enters the data repositories, generating alerts in case of an anomaly or uses outside the user's registers are detected.

Richard Santa, RAVT
Richard Santa, RAVTEmail: [email protected]
Editor
Periodista de la Universidad de Antioquia (2010), con experiencia en temas sobre tecnología y economía. Editor de las revistas TVyVideo+Radio y AVI Latinoamérica. Coordinador académico de TecnoTelevisión&Radio.


No comments

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
MEXDC renews its commitment to IntegraTec Mexico

MEXDC renews its commitment to IntegraTec Mexico

Mexico. IntegraTEC, the trade fair for Latin American technology integrators, is pleased to announce the extension of its collaboration agreement with the Mexican Association of Data Centers...

L-Acoustics was in charge of the sound at Super Bowl LIX

L-Acoustics was in charge of the sound at Super Bowl LIX

International. Caesars Superdome in New Orleans hosted Super Bowl LIX on Sunday, Feb. 9, its eighth major NFL Game since the iconic domed venue opened in 1975.

Variable acoustic directivity

Variable acoustic directivity

Also known in the industry as Beam Steering, it is an alternative concept of audio system design. Diego Cárdenas*

AVPro Edge's new video wall processor

AVPro Edge's new video wall processor

Latin America. AVPro Edge introduced the Fresco 8K video wall processor, which features 48 Gbps 8K Ultra HD bandwidth, as well as the evolving performance and longevity of 8K.

OSO Colmenero will have its third meeting in Mexico

OSO Colmenero will have its third meeting in Mexico

Mexico. On February 25 and 26, the representative of lighting and AV brands, OSO Colmenero, will have its third annual "Face to Face" meeting in Mexico City, a networking and training event for...

Christie Launched Hybrid RGB Projector Pure Laser and Phosphor

Christie Launched Hybrid RGB Projector Pure Laser and Phosphor

Latin America. Christie launched the Sapphire 4K40-RGBH projector, which combines pure solid-state RGB laser lighting with a dual phosphor laser system, creating the first high-brightness hybrid RGB...

Q-SYS VisionSuite is now certified for Google Meet

Q-SYS VisionSuite is now certified for Google Meet

Latin America. The Q-SYS VisionSuite AI accelerator for presenter tracking adds to the list of Q-SYS solutions certified for Google Meet, including Q-SYS Core processors, NC Series cameras, and...

Powersoft acquires 51% of K-Array, with 100% option

Powersoft acquires 51% of K-Array, with 100% option

International. Powersoft has entered into a binding investment agreement to acquire 51% of K-Array's share capital from H.P. Sound Equipment. The Agreement also provides for the mutual granting of...

Panduit Closes 2024 with Growth, Prepares Expansion

Panduit Closes 2024 with Growth, Prepares Expansion

Latin America. In a year marked by technological acceleration and digital transformation in Latin America, Panduit concluded 2024 as its sixth consecutive year with an increase in demand for...

Epson's Global President Visits Mexico and Brazil

Epson's Global President Visits Mexico and Brazil

Latin America. Yasunori Ogawa, Epson's Global President and CEO, visited the company's offices in Brazil and Mexico, a presence that reinforced the strategic relevance of Latin America for Epson, as...

Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS
SITE SPONSORS










LATEST NEWSLETTER
Ultimo Info-Boletin