APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Field Service
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    E-commerce and the Data behind it

    Klemen Drole, CIO, Lazada Group

    The Bi-Model Approach to Customer Engagement

    Sumit Puri, CIO, Max Healthcare

    PropTech: the Future of Real Estate

    Aidan Coleman, CIO & CTO, Charter Hall

    mobileOne Technology: Real-Time Solutions to CPGs

    CEO

    myFLO: Streamlining Business Processes through Comprehensive Field Solutions

    Founder

    Field Force Automation: Where We Are, and Where We Need to Go

    Kelvin Hubbard, COO & CIO, Visual Mobile Technologies, Inc.

    Field Service Management Lifecycle

    Dean Lane, Executive or CIO Consultant, The Office of the CIO & Mayumi Okada, Executive or CIO Consultant, The Office of the CIO

    Technology is No Longer a Support Function

    Mark Wilmshurst,

    right

    Weather the Security Storms Ahead by Knowing your Data

    Shaun McLagan, Senior Vice President, Asia Pacific and Japan, Veeam Software

    Tweet
    content-image

    Shaun McLagan, Senior Vice President, Asia Pacific and Japan, Veeam Software

    Whether you’re a government, bank, airline, telecoms or retail company, no-one is safe in today’s world of omnipresent cyber threats. Which means your data has never been at more risk. From data privacy, cyberattacks to insider threats, getting breached and compromised is simply an inevitable fact that people must accept.

    You will get hacked. You may or may not get fined. But your reputation may never recover. Your customers, partners and stakeholders will accept that security breaches can and will occur. What they cannot accept is the inability to detect, to know the impact and to immediately respond and protect their data.

    Knowing your data, where it resides, how it’s being managed and when integrity is compromised is the best possible way to being prepared to weather the inevitable storm of a data breach or cyberattack. But this is particularly difficult in an age of rapid growth in volume and sprawl of data.

    The importance of data visibility

    The rise of IoT and interconnected systems means that today’s data is drastically different from yesterday’s data. Every interaction, be it internal or external leaves a trail of data that could potentially be traced and exploited. Large and successful businesses hold a vast amount of third-party data, resulting in far higher stakes for their data management solutions.

    Should this third-party data such as credit card, passport or ID card numbers be compromised. This information could be used on the “dark web” as fake identification and compromise customer security.

    It is pertinent for organizations to learn how to intelligently manage vast amounts of data. Unified visibility and control into usage, performance issues and operations minimize gaps in management. Investing in dashboard visibility is one method that enables IT teams to immediately pinpoint where and when a data breach occurs.

    Attack prevention cannot stand alone

    Preventing attacks in the first place is only the initial line of defence, but a breach is inevitable.

    IT is pertinent for organizations to learn how to intelligently manage vast amounts of data

    Beyond great perimeter security, enterprises need to provide assurances to customers and stakeholders that applications will return to service soon and be informed as soon as their data has been compromised.

    The only way to do that is by knowing the data you store inside and out.

    Careful treatment of privileged accounts and control of permissions, ensuring regularly updated antivirus and anti-malware scans, and awareness training for employees are important aspects of cybersecurity. However, if you know exactly where all your data is, what its purpose is and how it can be used, you can act quicker to analyse the impact of a breach, begin a targeted recovery process as well as inform all affected parties. This ensures minimal downtime as well as the ability to assure your customers and stakeholders as to whether their data has been affected.

    Responsible reaction

    In the event that despite best efforts, malicious users still manage to navigate through your best defences and leave you at a loss to assess the damage, a public admission months after a data breach is no longer acceptable. Aside from falling foul of new regulations across the world (particularly in Europe with GDPR), users deserve to know when their data has been accessed.

    Under EU law, breaches should be reported within 72 hours, and corporate lawyers globally should be aware of this since the enactment if GDPR on May 25 this year. So while businesses in Asia may not all need to comply, any business with dealings in Europe, have customers or hold data that is located in Europe should all be seeking clarification with lawyers to ensure they avoid the hefty penalties in case of non-compliance. The question arises again – do you know your data well enough to identify these risks and be able to act on them immediately?

    Own your data, control the problem

    Veeam’s work with different banks for example have shown how knowing your data means that you can be on top of your business. They valued the ability to recover individually deleted emails to customer requests for data that has been buried in terabytes of other data. They were able to leverage application item recovery for security and compliance purposes as well. So that if an employee or partner claimed their security privileges have been changed our client can easily browse the backups and verify their claims.

    On top of this, our clients found that a good data management solution allowed them to track trends and pre-empt the need to adjust resources according to fact-based forecasting which helps maintain hyper-availability of their data no matter the demand or scenario or risk.

    The constant stream of recent high-profile security incidents around the world serve to remind us all of the importance of data visibility, security, and the need to respond – in raising alerts for suspicious activity, in understanding and mitigating situations and in updating affected users on the situation. Organizations need to take the proper steps to ensure they own their data and are not being owned by data.

    tag

    Data Management

    Cyber Threats

    IoT

    Weekly Brief

    loading
    Top 10 Field Services Companies - 2020
    ON THE DECK

    Field Service 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Building Agile, Secure and Human-Centered IT at Globe

    Building Agile, Secure and Human-Centered IT at Globe

    Raul Macatangay, Chief Information Officer, Globe Telecom
    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://field-service.apacciooutlook.com/cxoinsights/weather-the-security-storms-ahead-by-knowing-your-data-nwid-6111.html