Security Risks and How To Stop Them

Security Risks and How To Stop Them

Security Risks


As dangerous breaches and hacks dominate our daily news, security issues demand executive attention more than ever. For many companies, the target of these events is rooted in the data center – specifically, in storage.

While we’ve already seen data storage driving business 5-reasons-chief-security-officers-csos-need-to-get-more-involved-in-the-data-center-1-638and setting new expectations for the IT industry, as attacks threaten the safety of the intellectual property, financial data and personally identifiable information (PII) housed in any storage platform, it’s clear that storage administrators and security personnel need to closely work together to mitigate risks.

However, many organizations cling to departmental silos that cause breaks in communication between security, IT and executive teams. In a recent post on Network World, Jon Oltsik, principal analyst at Enterprise Strategy Group, discussed the dangers of these actions and why the roles of chief security officers (CSOs) and chief information security officers (CISOs) are overdue for an update. Oltsik explains why CSOs should root their perspectives in IT in order to fully understand their company’s security policies and data governance needs, and how by doing so, these executives have the chance to identify vulnerabilities before they take hold.

Our latest SlideShare, “5 Reasons CSOs Need to Get More Involved in the Data Center,” explores this idea further, highlighting how this shift can help companies avoid the consequences of compliance missteps and security attacks.

In many cases, it only takes a conversation about priorities for CSOs to recognize the value of these actions and incite change within their organizations.

For example, consider your security team’s responses to these questions.


  1. Would their answers change if they had input from IT?
  2. Are you fully protecting the company’s most valuable intellectual property? Who determined which data this category includes?
  3. Would you know if a file containing credit card data or personally identifiable information (PII) was mistakenly saved in the public domain?
  4. If, like many companies, you are expected to comply with industry regulations such as HIPAA or GLBA, are you confident that every one of your employees’ habits would pass an investigation at any given point in time?
  5. Data protection is strengthened when it takes place at the point of data creation – just like insights are more actionable and valuable when they’re collected at the point of storage.