New Blog Post | Microsoft shares 4 challenges of protecting sensitive data and how to overcome them

%3CLINGO-SUB%20id%3D%22lingo-sub-3238725%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Microsoft%20shares%204%20challenges%20of%20protecting%20sensitive%20data%20and%20how%20to%20overcome%20them%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3238725%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CLO22_RemoteHome_045-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F352155iB4CBC91E1F1544F8%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO22_RemoteHome_045-900x360.jpg%22%20alt%3D%22CLO22_RemoteHome_045-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F03%2F01%2Fmicrosoft-shares-4-challenges-of-protecting-sensitive-data-and-how-to-overcome-them%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20shares%204%20challenges%20of%20protecting%20sensitive%20data%20and%20how%20to%20overcome%20them%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EBreaches%20of%20sensitive%20data%20are%20extremely%20costly%20for%20organizations%20when%20you%20tally%20data%20loss%2C%20stock%20price%20impact%2C%20and%20mandated%20fines%20from%20violations%20of%20General%20Data%20Protection%20Regulation%20(GDPR)%2C%20California%20Consumer%20Privacy%20Act%20(CCPA)%2C%20or%20other%20regulations.%20They%20also%20can%20diminish%20the%20trust%20of%20those%20who%20become%20the%20victims%20of%20identity%20theft%2C%20credit%20card%20fraud%2C%20or%20other%20malicious%20activities%20as%20a%20result%20of%20those%20breaches.%20In%202021%2C%20the%20number%20of%20data%20breaches%20climbed%2068%20percent%20to%201%2C862%20(the%20highest%20in%2017%20years)%20with%20an%20average%20cost%20of%20USD4.24%20million%20each.%3CSUP%3E1%3C%2FSUP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EAbout%2045%20million%20people%20were%20impacted%20by%20healthcare%20data%20breaches%20alone%E2%80%94%3CWBR%20%2F%3Etriple%20the%20number%20impacted%20just%20three%20years%20earlier.%3CSUP%3E2%3C%2FSUP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESensitive%20data%20is%20confidential%20information%20collected%20by%20organizations%20from%20customers%2C%20prospects%2C%20partners%2C%20and%20employees.%20Common%20types%20of%20sensitive%20data%20include%20credit%20card%20numbers%2C%20personally%20identifiable%20information%20(PII)%20like%20a%20home%20address%20and%20date%20of%20birth%2C%20Social%20Security%20Numbers%20(SSNs)%2C%20corporate%20intellectual%20property%20(IP)%20like%20product%20schematics%2C%20protected%20health%20information%20(PHI)%2C%20and%20medical%20record%20information%20that%20could%20be%20used%20to%20identify%20an%20individual.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EEvery%20level%20of%20an%20organization%E2%80%94%3CWBR%20%2F%3Efrom%20IT%20operations%20and%20red%20and%20blue%20teams%20to%20the%20board%20of%20directors%E2%80%94%3CWBR%20%2F%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Ecould%20be%20affected%20by%20a%20data%20breach.%20How%20do%20organizations%20identify%20sensitive%20data%20at%20scale%20and%20prevent%20accidental%20exposure%20of%20that%20data%3F%20Let%E2%80%99s%20look%20at%20four%20of%20the%20biggest%20challenges%20of%20sensitive%20data%20and%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fcompliance%2Finformation-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Estrategies%20for%20protecting%20it%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3238725%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EData%20Loss%20Prevention%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

CLO22_RemoteHome_045-900x360.jpg

Microsoft shares 4 challenges of protecting sensitive data and how to overcome them - Microsoft Secu...

Breaches of sensitive data are extremely costly for organizations when you tally data loss, stock price impact, and mandated fines from violations of General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), or other regulations. They also can diminish the trust of those who become the victims of identity theft, credit card fraud, or other malicious activities as a result of those breaches. In 2021, the number of data breaches climbed 68 percent to 1,862 (the highest in 17 years) with an average cost of USD4.24 million each.1 About 45 million people were impacted by healthcare data breaches alone—triple the number impacted just three years earlier.2

 

Sensitive data is confidential information collected by organizations from customers, prospects, partners, and employees. Common types of sensitive data include credit card numbers, personally identifiable information (PII) like a home address and date of birth, Social Security Numbers (SSNs), corporate intellectual property (IP) like product schematics, protected health information (PHI), and medical record information that could be used to identify an individual.

 

Every level of an organization—from IT operations and red and blue teams to the board of directors— could be affected by a data breach. How do organizations identify sensitive data at scale and prevent accidental exposure of that data? Let’s look at four of the biggest challenges of sensitive data and strategies for protecting it.

0 Replies