Filter by Category

Looking to 2022: New Year, New Data Security Strategies

3 Data Centric Security Strategies for 2022

Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies taken to mitigate those threats.

It’s time to consider whether the safeguards and plans your organization has in place are enough.

Today’s Cybersecurity Threats and Responses

Today’s biggest threats rely on gaps in your data security and knowledge. For example, phishing, an established threat that’s only been growing, hinges on the hope that people don’t know how to successfully identify a fraudulent email. On the other hand, ransomware lays in wait for access to sensitive systems and data that aren’t adequately protected.

To stay ahead of these attacks, organizations must stay committed to engaging and educating employees on the growing ingenuity of hackers, as well as identifying security gaps in their systems and processes and discovering new safeguards they can implement.

“2022 is the year that the C suite recognizes that they are getting further and further behind on their security projects.”
- Tom Huntington, Executive Vice President of Technical Solutions at HelpSystems

For your organization, responding to today’s hazards could be as easy as implementing multi-factor authentication for your internal systems, or as involved as a total top-down rebuilding of your data security strategy. Whichever the case, take a step back, identify your vulnerabilities, and start making plans to update your data security strategy for the upcoming year.

Related Reading: The Top 10 Cybersecurity Trends of 2021

What is a Defense in Depth Strategy?

Defense in depth (DiD) is a security approach that employs multiple safeguards to protect against cybersecurity threats and breaches. While the defense in depth strategy is based on similar military strategies that rely on multiple layers of security to slow down an attack, it strengthens the approach by attempting to thwart the attack entirely. “The motto, ‘prevent first, detect always,’ must be adopted as a core preset for secure security operations programs. Remember, the goal of security is not to stop a hack. The goal is to prevent, detect, and respond to a threat actor before they successfully achieve their goal,” says Joe Vest, Tech Director for Cobalt Strike by HelpSystems.

"The motto, ‘prevent first, detect always,’ must be adopted as a core preset for secure security operations programs."
- Joe Vest, Tech Director — Cobalt Strike by HelpSystems

It’s important to be both on the offensive and the defensive, which can be achieved via methods to test for cracks, prevent access, and, in the worst-case scenario, detect it. IBM notes that “organizations struggle with slow detection and response times, while threat actors are rapidly gaining speed and moving to the cloud.” This is where a defense in depth strategy can help: with multiple stopgaps in place, it’s easier to impede an attack and identify it before any data is lost.

A defense in depth strategy can be broken down into three distinct areas:

  1. Physical: Think of your favorite heist film: what physical barriers is between your data and the outside world? These can include walls, retina scanners, locks, security cameras, or—if it’s Hollywood—laser beams would-be robbers can limbo through.
  2. Technical: Any hardware or software that’s in place to prevent and monitor access to your data centers or data itself. Returning to the Hollywood example, if you can imagine a hacker pressing random keys to break into a system, that’s the technical barrier.
  3. Administrative: The procedure side of the defense strategy. This is the security policy that your CISO spent months planning out, onboarding and offboarding access rules, data handling and sharing policies, and anything else that may inform what physical and technical barriers you need to put in place.

The redundancies within the defense in depth strategy provide a more robust barricade to potential hackers and, thanks to multiple layers addressing the same weaknesses, covers gaps that might otherwise be missed.

What is a Data Centric Security Strategy?

A data centric security strategy is a plan to focus on protecting an organization’s data. This includes any technology, processes, and policies that govern how data is collected, used, and stored throughout the data’s lifecycle. Rather than the traditional infrastructure-focused approach, which leans more heavily on protecting on-premise and cloud-based hardware and software from everything from cyber threats to physical breaches to natural disasters, a data centric approach takes a closer interest in the data contained in those environments.

Related Reading: What is the Data Security Lifecycle?

Alongside the many data compliance requirements rolled out in recent years, consumer opinion has also been changing. Today, 63 percent of consumers rank an organization’s data collection and storage practice as the most important element to consider when sharing sensitive information.

Industry research and best practices indicate that there are four key gaps in data security architecture that puts your data at risk. These are:

  1. Behavior: Will people follow processes properly, or will they take shortcuts that could put your data at risk?
  2. Visibility: Do you understand the data that you are sending and storing, and are only the appropriate people accessing it? Can you see who accesses it?
  3. Control: Can you limit who accesses data, or what data is shared and sent?
  4. Response Time: Does your organization as a whole—from your employees, to your procedures, to your infrastructure—have the flexibility to implement and understand changes in technology or processes?

Data centric security solutions offer businesses the ability to guarantee file-level security—to secure, track, and share any kind of data, no matter where it’s stored or located, or how it travels with robust policy enforcement, strong encryption, and strict access controls.

What is a Data and Risk Management Strategy?

One of the broader security strategies, data and risk management covers a wide range of steps organizations follow to protect data. You can start moving towards a data risk management strategy by doing the following:

  1. Assess your risk factors: What gaps do you currently have? What would a breach mean for you?
  2. Plan for attack: What will you do if an attack occurs? Do you have a mitigation and response plan in place?
  3. Educate your employees: Can your employees, especially the C-Suite, who tend to be the most targeted, identify a phishing attempt? Do they know the best practices for file sharing or network access?
  4. Understand your data: What data do you have on hand, who has access, and when do you get rid of it?
  5. Use a data security solution: Do you have software solutions in place, and do they give you the visibility you need to be proactive?

Read More: Developing a Plan for Data Risk Management

Among the barriers to successfully safeguarding data is discovering where sensitive data resides within an organization, according to The 2021 Global Encryption Trends Study, a survey conducted by the Ponemon Institute. Understanding what data you have on hand and where it’s stored is an essential step in any data-focused security strategy—you don’t want to have inconsequential information under lock and key, but sensitive, business-critical data out in the open.

More organizations are starting to use data classification systems to properly classify data’s sensitivity and create access controls. And, to keep that data internal, data loss prevention and content inspection solutions are often layered for added security.

How MFT Fits into Your Data Security Strategy

Managed file transfer (MFT) is a key player for protecting your data. MFT software solutions are centralized secure file transfer tools that solve key data transfer issues. These include human error during manual transfers, improved security with industry-standard encryption, and auditing, tracking, and auto-resume for failed transfers, so you know where your data is, who has access to it, and whether or not it’s arrived as expected.

Get Ahead of a Data Breach

Get ahead of a data breach and develop a strategy to keep your data secure. The risk of cyber threats is going to continue to grow – let us help you effectively prepare by bolstering your security strategy with a MFT solution like GoAnywhere MFT.

Related Posts


MFT’s Role in Data-Centric Security

Managed file transfer (MFT) plays a key role in an organization’s data-centric security strategy which helps protect the data itself.


The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Learn about the biggest threats to cybersecurity in the year 2022 and how to protect your organization from cybersecurity attacks tomorrow.


New Tech and New Hacks: How Are Cyber Risks Changing?

Discover today’s top cybersecurity risks, and what you can do to avoid them and stay ahead of the curve.


Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

You protect your network from cyber threats, but what about your files and file transfers? It’s time to add managed file transfer to your cybersecurity strategy.


Is it Time for a Scalable File Transfer Solution?

Exchanging data with a scalable managed file transfer solution delivers security, ease-of-use, and flexibility.