Increase data security by making it more accessible?

Increase data security by making it more accessible?

up
450 readers like this
CIO Security Lock

Too much security can be worse than not enough security, argues Adam Redd, CTO of integration and migration software company

GT Software. In an interview with The Enterprisers Project, he explains why.

The Enterprisers Project (TEP): How do you balance the need for protection with employees' need to have access to data to do their jobs?

Redd: Balance is exactly the right word here because many CIOs instruct their teams to protect data at all costs. Frequently that can come at the expense of data being so extremely difficult to access that it hinders employees from seeing the critical information they need. Often, the controls can make accessing data so slow and cumbersome that employees either cannot be effective in their jobs, or worse, they attempt to create an ungoverned solution on their own.

TEP: What are the biggest mistakes CIOs and other tech leaders make around such data?

Redd: One challenge for CIOs and other tech leaders is implementing proper policies, standards, and procedures for adequate governance around mission-critical data. It should not be so restrictive that data users create workarounds to access and store data.

Just as there is great risk in letting sensitive data get into the wrong hands, there is also an indirect danger of making data so cumbersome to find or access that when employees who need it get it, they create their own private data silo that is more readily accessible. This creates a risk for decisions to be based on outdated information. What's more, data in these silos may not be shared with others for fear that if discovered, it will be "trapped" within the IT lockdown. By creating incredibly tight control, a CIO can inadvertently create an illusion of security while actually increasing the risk for data breaches due to unknown disparate data sources.

CIOs should treat data access as a service for the data users, making it easy to find, access, and use, quickly, from one single source. By providing a single source for data that is easy to find, simple, and fast, they are ultimately creating a single source for data to secure and govern.

TEP: What advice would you give CIOs for dealing with sensitive data that their organizations need to gather and store?

Redd: I would recommend implementing proper security and governance through a central virtual data services platform that gives data consumers, from business analysts to application developers, a simple and easily-accessible platform for all enterprise data, like a "Real-Time Data Supermart." This would provide a win/win for both governance and ease-of-use. The CIO would be able to maintain control over the format, structure, access and security of the data by granting permissions or preventing unauthorized access. The user can access all the data that spans the enterprise through this one self-service source. And, regardless of the original format, the user should be able to access and re-structure the data virtually so that it can be used how and where the user needs it.

Minda Zetlin is a business technology writer and columnist for Inc.com. She is co-author of "The Geek Gap: Why Business and Technology Professionals Don't Understand Each Other and Why They Need Each Other to Survive," as well as several other books. She lives in Snohomish, Washington.

7 New CIO Rules of Road

CIOs: We welcome you to join the conversation

Related Topics

Submitted By Stephanie Overby
January 25, 2021

Digital transformation leadership strategies do not match up with traditional IT leadership principles. Make sure you're using approaches that set teams up for success

Submitted By Kristin Burnham
January 25, 2021

Ready to take a new step in your IT career? In 2021, interviews present some special challenges. Consider this expert advice

Submitted By David Talby
January 25, 2021

When Artificial Intelligence initiatives fall short, the blame is often placed on a skills gap. But there's more to it. Does your organization prioritize these three foundational AI pillars?

x

Email Capture

Keep up with the latest thoughts, strategies, and insights from CIOs & IT leaders.