It seems like every week there’s a report of a new data breach. As Apple notes in their December 2022 white paper, “the data ecosystem has become so vast and interconnected that people are only as safe as the least secure company that interacts with any company that has access to their data.”
As it turns out, there are a whole lot of “least secure” companies. Apple gives the example of the famous SolarWinds supply chain attack in 2019, in which malicious hackers were able to gain access to as many as 18,000 organizations who used SolarWinds software. Those attackers were able to infiltrate Microsoft, Intel, the Department of Homeland Security, the US Treasury, and more.
Meanwhile, there were over 290 million victims of data breaches in the US in 2021 alone — a sizable majority of the country’s population.
Clearly, unauthorized data access is a huge problem. But why is it happening, and what can be done to stop it? We’ll explore the issue below.
In short, because there’s so much data. Data growth is happening at an exponential rate and, as the statistics reveal, shows no sign of slowing down.
But it’s not just that data is growing exponentially — it’s also how the systems that manage that data are growing, and who’s being given access to them. While some new technologies like deep learning, machine learning, and novel language models genuinely do require access to vast amounts of data, access is often given inadvertently and inconsistently within companies.
According to a 2022 Cloud Security Alliance article, systems are sometimes built quickly for companies without adequate security safeguards, with speed prioritized over safety. For companies that are blitzscaling (or even just growing a little more quickly than usual), new roles may be created without a clear understanding of what data access they do or should have.
In short, companies often don’t know how much data they have, where it’s stored, or who has access to it.
To reduce the chances of a data breach, companies must first limit data access. One of the best options is the least-privilege approach of only granting access to the users who need it, and keeping even that access to a minimum. For instance, if read-only access is enough for a certain user, then organizations should ensure that write-only and admin access are not granted.
Other measures like MFA, biometric authentication, rapid incident response when breaches do occur, and reducing the amount of data that’s retained in the first place can all be helpful. Additionally, organizations can try:
However, scholars and security experts agree that access controls are not sufficient to keep sensitive data safe. As one study from the MIT Computer Science and AI Lab notes, “access control in itself is inherently inadequate as a framework for addressing privacy on the Internet.
In the past, traditional file-level encryption was one of the best ways to keep data safe and reduce the impact of unauthorized data access. Encryption ensures that selected information is unreadable to unauthorized viewers, so even if someone does access data they shouldn’t, they won’t be able to read it.
But file-level encryption also has downsides. It typically requires the installation of agents or applications on a server or client system, which in turn brings endpoint management and incompatibilities with newer services and infrastructures.
Agent-based file-level encryption can also slow down operations considerably, with performance lags ranging anywhere from 5% to 40%. And few traditional encryption solutions can provide the kind of strong data resilience features that ensure high availability and failover during outages and disruptions.
ShardSecure is helping companies regain control of their data by protecting against the impact of unauthorized data access, regardless of where that data is stored.
Our plug-and-play technology maintains the confidentiality of unstructured data and metadata in specific files, folders, or storage locations. It separates data from infrastructure owners, maintaining privacy from cloud admins, local storage admins, and more. (This separation of duties also helps support compliance with cross-border regulations like the GDPR and beyond.)
Just as importantly, ShardSecure’s solution does not require the use of agents or other resource-intensive processes, and it does not involve a performance hit. In some cases, it even improves performance. Organizations can store data anywhere — on-prem, in the cloud, or in hybrid- and multi-cloud environments — and remain well protected against the impact of unauthorized data access.
To learn more about ShardSecure’s benefits for file-level protection and advanced data security and resilience, check out our solution brief or visit our resources page today.
The Rising Threat to Consumer Data in the Cloud | Apple
Big Data for Sustainable Development | United Nations
Data: A Small Four-Letter Word Which Has Grown Exponentially to Such a Big Value | Deloitte
11 Big Data Trends for 2022/2023: Current Predictions You Should Know | Finances Online
Minimizing your Data Attack Surface in the Cloud | Cloud Security Alliance
More Than 40% of Companies Don’t Know Where Their Data Is Stored | Lepide
Access Control is an Inadequate Framework for Privacy Protection | W3.org