With the exponential growth of data, unstructured data organisations are facing a big challenge to manage this growth and the underlying risks. These risks include how to protect their data, meet regulatory requirements while also extracting value from the data. Data has often been called the new oil. I am not sure if I completely agree with this comparison but if both leak, depending on the scale, it can have untold consequences.

The definition of unstructured data used here is data not in a database but data in folder / file structures most commonly, word documents, spreadsheets, PDF’s, presentations, graphics to name a few. These can be on premise or in the cloud.  For example SharePoint Online, OneDrive, fileservers, etc

Why is this a challenge? There are a few questions need to be asked!

  • What data do you have?
    • Business plans
    • Personnel records
    • Clients data
    • Personally, Identifiable information (PII)
  • Who has access to the data?
    • Should they have access to the data?
    • Need to manage the movers, leavers and joiners to your organisation.
  • Has data been modified, deleted, or moved?
    • Why has the data been modified, deleted or moved?

All the above can be a risk to an organisation. If the data is leaked or stolen it can cause business disruptions, affect the brand of the organisation, and damage compliance with regulations which can can lead to penalties.

Varonis DatAdvantage can help
Taking steps to understand your organisations unstructured data can be valuable, however this can be a time consuming and resource heavy process.  Alternatively, your organisation can start an operational journey to monitor, protect and manage your data.  Asystec take a data-centric approach to help you better understand your data, gain insights into the risks associated with it and put controls in place tailored to your organisation. Utilising a tool like Varonis DatAdvantage. This automated process allows organisations to scan and monitor unstructured data to get visibility of permissions and activity, identify user behaviour, scan for sensitive data, etc in order to assess risk to your organisation .