16-07-2025
Is your data exposed?
It's fascinating to think that, despite all our advancements in technology, your data may still be exposed.
Let's start with a museum analogy. Artwork is, for all intents and purposes, read-only. As we were told as kids: 'Look with your eyes, not with your hands!' Museums even place protective glass in front of masterpieces. So why is this protective layer acceptable for art, but not for your data?
In the world of security, we talk about access control, authorization, and authentication—lots of permissions floating around. Once granted, it's like giving people the green light to handle the artwork—or, in this case, your data.
Why the double standard? It's like asking why police stations have lockers for on-duty officers. The answer is simple: As Depeche Mode so wisely sang, 'People are people.' So why should we expect people to be more responsible with critical data—data protected by laws that, if compromised, could cost companies millions, if not billions?
Subscribe to the Daily newsletter.
Fast Company's trending stories delivered to you every day
Privacy Policy
| Fast Company Newsletters
This brings us to the title of this article, 'Is Your Data Exposed?' The short and unfortunate answer is: Yes, it is. Behind all these controls, you have to ask yourself, 'Can someone 'touch' the data?' If so, I wouldn't hire you as a museum curator. Would you get the job if you allowed someone to touch the Mona Lisa? Absolutely not!
Now that I've exhausted my analogies, let's talk tech. If you could prevent people from accessing your data, would you? If this solution allowed for business continuity while keeping the data untouched, wouldn't that be appealing? If you could shield your data and hide it from prying eyes, wouldn't you?
But I know what you're thinking: 'This sounds impossible.' Many tech professionals might not even know such a solution exists. Well, don't worry, dear reader; I've got you covered. It does exist, and I'm here to tell you about it!
There are technologies that can shield your data, creating a protective layer between users and the data. Solutions that bridge the gap between security and backup. Wondering if you need this? Ask yourself: Are breaches still happening? If the answer is yes, then the gaps are real, and the struggle continues. It's time to explore alternative solutions. Thinking that cyber insurance is a magic bullet isn't going to address the root problem. Just like having car insurance doesn't mean you can drive recklessly, data owners still have a responsibility to protect their data.
If you've read my other articles, you know I love checklists. So, here's one to ponder: Is your data exposed?
Is your data accessible to human touch?
Can a non-database process access your database (for example, can your admin log into the server and grab the database without going through SQL Management Studio)?
Are you 110% confident you can recover from an attack?
Are you 120% confident you can restore your data to its pre-attack state (and in a timely manner)?
Are you 130% confident you've done everything you can to protect it?
I could keep going, but I'll stop here.
advertisement
If any of these questions are keeping you up at night, it's time to stop relying solely on insurance and start acting responsibly. Shield your data! And if you're feeling bold, show up to work dressed as a Roman gladiator, stand on your desk, and ask your coworkers, 'Are you not entertained?' If they give you strange looks, tell them this article gave you permission.
All jokes aside, now is the time to embrace a solution that protects your data from threats, ransomware, and human error. You've got this. But how do you get started?
Start by evaluating your current data security stack. Is your approach reactive (i.e., backup and recovery) or proactive (i.e., preventing modification or encryption in the first place)? A true data-shielding solution should function like protective glass: users can interact with applications without altering the underlying data.
Here are some considerations to help get started: Know What You're Shielding: Catalog your critical data assets. This includes databases, file shares, cloud storage, endpoints—anywhere sensitive information lives.
Catalog your critical data assets. This includes databases, file shares, cloud storage, endpoints—anywhere sensitive information lives. Evaluate Your Environment: Understand where you're vulnerable. Are users accessing data directly? Are backups unprotected or easily corrupted? What's your exposure from insider threats or third-party access?
Understand where you're vulnerable. Are users accessing data directly? Are backups unprotected or easily corrupted? What's your exposure from insider threats or third-party access? Prioritize Business Continuity: Look for solutions that don't interrupt workflows. The best approaches allow data to be used without the ability to modify it, so operations continue smoothly, even under attack.
Look for solutions that don't interrupt workflows. The best approaches allow data to be used without the ability to modify it, so operations continue smoothly, even under attack. Avoid Detection-Only Tools: Signature-based or AI-only defenses may miss zero-day or fileless malware. Choose technologies that don't rely solely on detection but can prevent changes to data, even if malware slips past your defenses.
Signature-based or AI-only defenses may miss zero-day or fileless malware. Choose technologies that don't rely solely on detection but can prevent changes to data, even if malware slips past your defenses. Plan For Implementation Challenges: Expect resistance. Shielding solutions can be misunderstood as restrictive or complex. Involve stakeholders early. Pilot deployments with limited scope can help prove the concept and win support.
Expect resistance. Shielding solutions can be misunderstood as restrictive or complex. Involve stakeholders early. Pilot deployments with limited scope can help prove the concept and win support. Watch For Red Flags: Beware of solutions that require constant updates to remain effective, only protect files during backup and not in real time, and rely on heavy system performance trade-offs.
Beware of solutions that require constant updates to remain effective, only protect files during backup and not in real time, and rely on heavy system performance trade-offs. Budget For Success: While cost varies, shielding technologies are far more affordable than the cost of a single breach. But budget for more than software. Include training, monitoring, and change management in your planning.
Finally, don't expect perfection overnight. Shielding data is about adding a resilient layer of protection to an already complex system. It's not a silver bullet—but it's an essential step toward ensuring that the next breach doesn't become your headline.
Just as Beyoncé encouraged us to 'put a ring on it,' I'm here to encourage you to put a shield on it—and protect what matters most.