Professional Documents
Culture Documents
What Is Data Security - Technologies, Standards Defined - Forcepoint
What Is Data Security - Technologies, Standards Defined - Forcepoint
What Is Data Security - Technologies, Standards Defined - Forcepoint
This website uses cookies. By continuing to browse this website, you accept our
Scale your security strategy to protect people and data wherever work happens.
CYBER EDU
https://www.forcepoint.com/cyber-edu/data-security 1/6
5/4/2020 What is Data Security? Technologies, Standards Defined | Forcepoint
Share
Data security is a set of standards and technologies that protect data from intentional or
accidental destruction, modi fication or disclosure. Data security can be applied using a range
of techniques and technologies, including administrative controls, physical security, logical
Learn How
All businesses today deal in data to a degree. From the banking giants dealing in massive
volumes of personal and financial data to the one-man business storing the contact details of
his customers on a mobile phone, data is at play in companies both large and small.
The primary aim of data security is to protect the data that an organization collects, stores,
which device, technology or process is used to manage, store or collect data, it must be
protected. Data breaches can result in litigation cases and huge fines, not to mention damage
to an organization's reputation. The importance of shielding data from security threats is more
https://www.forcepoint.com/cyber-edu/data-security 2/6
5/4/2020 What is Data Security? Technologies, Standards Defined | Forcepoint
Data security technology comes in many shapes and forms and protects data from a growing
number of threats. Many of these threats are from external sources, but organizations should
also focus their e fforts on safeguarding their data from the inside, too. Ways of securing data
include:
Data encryption: Data encryption applies a code to every individual piece of data and will
not grant access to encrypted data without an authorized key being given
Data masking: Masking speci fic areas of data can protect it from disclosure to external
malicious sources, and also internal personnel who could potentially use the data. For
example, the first 12 digits of a credit card number may be masked within a database.
Data erasure: There are times when data that is no longer active or used needs to be
erased from all systems. For example, if a customer has requested for their name to be
Data resilience: By creating backup copies of data, organizations can recover data should
When an organization collects any kind of personal data, it instantly becomes known as a data
processor. This label comes with a lot of responsibility. For this reason, there are a number of
compliance regulations that govern organizations dealing in personal data regardless of the
type or volume. The regulations that a ffect your organization will depend on a selection of
factors, such as the industry you are operating in and the type of data you store. For example,
if you store data relating to citizens in the European Union (EU) you will need to comply with
the latest GDPR regulations. Failure to comply with any regulations that a ffect your
organization could result in hefty fines.
https://www.forcepoint.com/cyber-edu/data-security 3/6
5/4/2020 What is Data Security? Technologies, Standards Defined | Forcepoint
Regulatory compliance requirements often vary by data type. A few common examples
include:
It is entirely possible to enforce a solid data security strategy that protects your most
seconds and share data with third parties with con fidence. Whether you need to comply with
GDPR regulations or PHI/HIPAA legislation, DLP has the built-in expertise to prepare and
Related
Balancing Data Protection and Privacy for E ffectively Evaluating Security Risk
https://www.forcepoint.com/cyber-edu/data-security 4/6
5/4/2020 What is Data Security? Technologies, Standards Defined | Forcepoint
What is FedRAMP?
https://www.forcepoint.com/cyber-edu/data-security 5/6
5/4/2020 What is Data Security? Technologies, Standards Defined | Forcepoint
Report a Vulnerability
Contact Us
Careers
Services
Free Trials
https://www.forcepoint.com/cyber-edu/data-security 6/6