Intelligent CISO Issue 54 | Page 65

W digital economy having access to more data than ever before , a good data management and protection strategy is critical . Not only does proper data management allow for intelligent , informed decisionmaking , it also reduces the risk of data loss and , importantly , ensures that valuable data is secure and protected from theft and attacks .

Protecting an organisation ’ s most valuable asset : Why a solid data management and protection strategy is non-negotiable

Pieter Engelbrecht – Datacentrix Business Unit Manager : Data Management Solutions , highlights why a solid data management and protection strategy is more important than ever before , as well as offering advice on best practices and how to implement this type of strategy .
ith businesses in today ’ s

W digital economy having access to more data than ever before , a good data management and protection strategy is critical . Not only does proper data management allow for intelligent , informed decisionmaking , it also reduces the risk of data loss and , importantly , ensures that valuable data is secure and protected from theft and attacks .

We ’ ve seen many examples recently , both global and local , on what can happen when your data falls into the wrong hands . Unfortunately South African companies are being increasingly targeted by cybercriminals , a point that has become more and more apparent over the past two years , as businesses had to rapidly make changes to their environments for remote working .
Best practices for data security
There are three best practices required for data management , namely : protection , detection and recovery .
1 . From a protection point of view , businesses must ensure that they have three copies of data at the very least – two copies on different storage types and a third copy held off site on immutable storage . 2 . For detection , it is important that any data backup and recovery solution implemented includes malware scanning and anomaly detection . Because there are generally few changes from backup to backup , your solution must be able to report on an out-ofcharacter increase in change rates for instance , as this could indicate an anomaly and will allow you to take swift action .
3 . When it comes to recovery , the rule of thumb is that the sooner you know there is an issue , the sooner you can recover from it – by the time you receive that ransom note it ’ s too late . Systems and solutions must be tested regularly and it ’ s also important to ensure that employees know how to use the solution and are comfortable with it , as there is an important people element when it comes to data management .
Encryption is also more important now than ever before , because even if data is taken , it is then more difficult for the cybercriminal to decrypt without the correct keys . u
Ransomware is a particular challenge locally , with Mimecast reporting earlier this year in its State of Email Security 2022 report that 60 % of South African companies had experienced a ransomware attack over the previous 12 months , a statistic that had increased from 47 % in 2020 .
The truth is that it ’ s a case of when an organisation will be affected by a ransomware attack , not if , and therefore similar to physical home security , it must have measures in place that make it more difficult for would-be criminals to gain access . intelligent DATA SECURITY www . intelligentciso . com
65