How to Really Protect Your Valuable Data Event – Thursday 19th March

Last month, I attended a special breakfast event on Data Security, organised by Gardner Systems plc. Held at Partnership for Learning in Speke, the event included talks from data security and counter-terrorism specialists. Working in IT, I am constantly aware of the importance of keeping data secure. In addition to networking with other IT professionals, I wanted to educate and broaden my knowledge and understand of data security.

Technology has changed how organisations operate. From bricks and mortar to the digital age, technology has brought many advantages. However the disadvantage is the vulnerability of an organisation’s data, to potential misuse and cyber attacks has increased substantially. The event gave me a useful and disturbing insight into how there is a general lack of knowledge and failure, to grasp the size and nature of cyber attacks that can occur both internally and externally. In addition, there were some other interesting points that interested me, which included:

  1. 80% of data stored by organisations is unstructured data (data not contained in databases).
  2. Most security vulnerabilities are found in third-party applications.
  3. Portable devices or end points (laptops, smart phones) hold 28% of organisational data.
  4. Human factors need to be taken into consideration in data security.
  5. CEOs’ are now being held more accountable for data losses in their organisations.
  6. Cyber attacks are regarded as a Tier-1 threat to National Security by GCHQ. This is the highest level of alert!
  7. Different cyber attacks range from espionage from other countries to commercial competitors.
  8. Cyber attacks are real and present a clear and present danger to UK plc!
  9. The UK Government has a website providing advice on cyber security, which can be found here.

Securing data is a complex puzzle requiring a multi-layered approach. This requires a complex solution of products, procedures, human awareness and clearly defined written policies. In addition, solutions must be specifically tailored and integrated effectively, to address the security needs of customers, whilst balancing usability. Tailoring is important, as organisations will have different security requirements, depending on different factors such as IT infrastructure setup, organisational structure, environment and geography.

I really enjoyed the event, as it was not only informative, but also fascinating to be given an insight into data security. This is not only important to protect an organisation’s reputation and brand, but also the national infrastructure, and the threats posed by cyber attacks must not be taken lightly!

I would like to thank Gardner Systems plc for organising the event, and to the speakers who contributed. You can find more information on what tailored IT solutions Gardner Systems can provide your business here.


One thought on “How to Really Protect Your Valuable Data Event – Thursday 19th March

  1. Pingback: Busting the Myths of Data Security | The Official Website of Ben Cross

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s