Two light bulbs

How IT can shine a light on dark data

by ā€‹George Dearing

Summary

Steps to consider taking with unstructured data

Time: 3 minute read

Itā€™s time to bring the security issues of dark data into the light.

Todayā€™s IT managers are facing increasing pressure to manage a growing stockpile of ā€œdark,ā€ unstructured data. Comprised of human-generated files (think spreadsheets, presentations, PDFs, Word documents, etc.), dark data is often where an organizationā€™s most sensitive information resides.

How can your business protect its unstructured data? It starts with IT leadership that puts a priority on unstructured data.

Examples of dark data

A recent CIO article says that 80 percent of all data in any organization is unstructured and within that unstructured data, nearly 100 percent of an organizationā€™s sensitive information is contained.Ā¹

The low-hanging fruit of the dark data world is most often the terabytes of personal .PST files from employeesā€™ email applications. These files can consume massive amounts of storage resourcesā€”and often contain secure information. IT should be responsible for putting processes in place for monitoring and deleting .PST files and personal archives.

Leveraging more sophisticated analytics and data tools and processes can improve (and minimize when necessary) legacy data use cases. Clustering techniques, for example, can help visualize dark data content patterns and identify application and policy development groupings.

ā€‹IT professionals need to work across departments within the business to prioritize security and recognize that todayā€™s enterprises require a unified view of structured and unstructured data.

Data mapping: The importance of visibility

In order to monitor the security of your network, IT departments need to gain visibility into all of the enterpriseā€™s current data repositories and systems. This process usually begins with creating a data map, which outlines all of the existing repositories within the network. This initial mapping is key when IT is identifying the right levels of security, and the mapping exercise can save weeks of lost time, costs and productivity.

Protect against a leading causes of data breaches

Learn about our Cybersecurity Services

Learn more

Process makes perfect

Once an accurate view of the network is established, IT should set up ongoing processes that allow secure management of the data inventory and other information assets. There are plenty of analytics and business intelligence tools available to extract value from the data, once youā€™re down that path. But with regard to security, this stage is when access control plays a big role. Ensure that the right team is in place to delegate controlled access across the company. This process not only helps all parts of the organization minimize compliance risks, but may also help departments gain more insight from data they didnā€™t know they had under their jurisdiction.

Learning to manage dark data

Dark data management is still a newer discipline in the IT world, and the technology is moving fast. But IT professionals need to work across departments within the business to prioritize security and recognize that todayā€™s enterprises require a unified view of structured and unstructured data. Putting the right processes in place to streamline workflows and keep information secure is where the real ROI lies.

Recommended for you

5 reasons business needs business continuity plan
5 reasons business needs business continuity plan

5 reasons business needs business continuity plan

Find out what a business continuity plan is and why it's important to have one in place before disaster strikes instead of scrambling after. Learn more.

Will your business survive the digital apocalypse?
Will your business survive the digital apocalypse?

Will your business survive the digital apocalypse?

Unless you successfully manage the digital transformation, your company may not exist in 10 years. So what can your business do to survive?

Finance Document Management System
Finance Document Management System

Finance Document Management System

Stream line your work with Ricoh's finance document management system. Serve your company and create efficient automated workflows with a managed cloud SaaS.

  1. 1Michael Santarcangelo. "7 Ideas for Security Leaders." CIO Magazine. January 28, 2015. http://www.cio.com/article/2876758/security0/7-ideas-for-security-leaders.html#slide4