{"id":49675,"date":"2008-11-26T11:49:00","date_gmt":"2008-11-26T08:49:00","guid":{"rendered":"https:\/\/www.altoros.com\/blog\/?p=49675"},"modified":"2021-08-30T20:01:32","modified_gmt":"2021-08-30T17:01:32","slug":"ignoring-security-leads-to-huge-data-management-problems","status":"publish","type":"post","link":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/","title":{"rendered":"Ignoring Security Harms Data Management"},"content":{"rendered":"<p><center><small>(<a href=\"https:\/\/www.ponemon.org\/local\/upload\/file\/2008%20PTS%20Banking%20Report%20FINAL%201.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">Featured image credit<\/a>)<\/small><\/center><\/p>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#Heterogeneous_data_as_a_threat\" >Heterogeneous data as a threat<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#Internal_vulnerabilities\" >Internal vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#Tips_to_improve_data_protection\" >Tips to improve data protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#Enable_transparency\" >Enable transparency<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#Further_reading\" >Further reading<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Heterogeneous_data_as_a_threat\"><\/span>Heterogeneous data as a threat<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ponemon Institute <a href=\"https:\/\/idm.net.au\/blog\/0083no-control-unstructured-data\" rel=\"noopener noreferrer\" target=\"_blank\">surveyed<\/a> 870 IT professionals and found &#8220;nearly 70% feel that access to their unstructured data by employees is very often unwarranted.&#8221; Furthermore, 84% admit this data &#8220;is accessible by people with no business need for access.&#8221;<\/p>\n<p>The problem usually lies in the way unstructured data is spread across the organization\u2019s knowledge management systems, corporate applications (CRM \/ ERP systems), databases, files, etc., and the lack of a clear vision of how it should be consolidated. Recent Gartner research supports this with the figures of as much as 80 percent of actual or potentially mission-critical enterprise information taking the form of <a href=\"https:\/\/www.altoros.com\/blog\/unstructured-data-a-challenge-for-it-decision-makers\/\">unstructured<\/a> or semi-structured data.<\/p>\n<p>So, you are at the stage where you\u2019ve already realized that your company lives and thrives on data (research, development data, customer private data, contact list, spreadsheets \/ tables, etc.). You work so hard and do everything you can to keep your data clean and consolidated, and once you finally have the system that delivers quality at hand, you realize that your data isn\u2019t exactly safe. Bummer! Today, when information is as valuable as it is and companies cannot afford having it stolen, lost, or disclosed, information security becomes the critical element and basically the driving force in most business processes.<\/p>\n<p><center><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/11\/benefits-from-enterprisewide-data-management-initiatives2.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/11\/benefits-from-enterprisewide-data-management-initiatives2.png\" width=\"640\" class=\"aligncenter size-full wp-image-63281\" \/><\/a><small>Source: &#8220;State of the Data Integration Market 2008\u20132009&#8221; (<a href=\"http:\/\/hosteddocs.ittoolbox.com\/soa_us_en_wp_statedimarket.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">Oracle<\/a>)<\/small><\/center><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Internal_vulnerabilities\"><\/span>Internal vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>All potential threats can be divided into external or internal ones. External threats include unauthorized programs (such as worms, Trojan viruses, spy programs, etc.), and there is really no universal solution that would protect your company from all types of threats, that\u2019s why there are so many specialized tools taking care of each particular problem. However, it\u2019s the <strong>internal threats<\/strong> that usually make companies most vulnerable.<\/p>\n<blockquote><p>A recent <a href=\"https:\/\/web.archive.org\/web\/20080719202151\/http:\/\/www.ebizq.net\/topics\/eii\/features\/9466.html\" rel=\"noopener noreferrer\" target=\"_blank\">Forrester survey<\/a> of 305 security and e-mail professionals revealed some scary but realistic statistics:<\/p>\n<p>1 in 3 companies investigated a breach of confidential data last year.<br \/>\n1 in 4 companies experienced an \u201cembarrassing\u201d leak of confidential information.<br \/>\n1 in 5 e-mails contains a legal, financial, or regulatory risk.<\/p><\/blockquote>\n<p>Here, two of the most probable scenarios of information security violation are:<\/p>\n<ul>\n<li>the deliberate theft of confidential data by authorized users (or so-called <i>insiders<\/i>)<\/li>\n<li>unintentional leak that can be caused by a number of factors (lack of awareness about company\u2019s security policies, for instance)<\/li>\n<\/ul>\n<p>When creating an information security system, developers try to extend its functionality to the maximum so as it would ensure extensive protection. Even operation systems today contain security features designed to increase an enterprise\u2019s safety level. But this \u201cuniversality\u201d is unacceptable when speaking of valuable data. A universal security system becomes useless in corporate networks, where internal threats prevail (whether intentionally or not).<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Tips_to_improve_data_protection\"><\/span>Tips to improve data protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ways out? Again, an integrated approach.<\/p>\n<p>First of all, <i>would you send your data by post<\/i>? I loved the way <a href=\"https:\/\/web.archive.org\/web\/20081225164217\/http:\/\/www.ebizq.net\/topics\/eii\/features\/10644.html?page=1\" rel=\"noopener noreferrer\" target=\"_blank\">this article<\/a> by <a href=\"https:\/\/www.linkedin.com\/in\/calummacleod\/\" rel=\"noopener noreferrer\" target=\"_blank\">Calum Macleod<\/a> of Cyber-Ark Software makes a parallel between postal services and data integration. It compares the mail we send via regular post to the data we migrate between applications enterprise-wide.<\/p>\n<p>Come to think of it, data integration market these days is a lot like the postal services market. People don\u2019t feel 100% confident with neither of them, whether it\u2019s something of value you decide to send to your relatives, or it\u2019s your customer data you\u2019re synchronizing with your accounting system. At least, with data integration, you can check to see that the integration tool lives up to your security expectations before using it.<\/p>\n<p>So, consider these tips by Calum Maclead on how to deal with data securely:<\/p>\n<div id=\"attachment_62677\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/11\/calum_macleod.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-62677\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/11\/calum_macleod-150x150.jpg\" width=\"150\" height=\"150\" class=\"size-thumbnail wp-image-62677\" \/><\/a><p id=\"caption-attachment-62677\" class=\"wp-caption-text\"><small>Calum Macleod<\/small><\/p><\/div>\n<blockquote><p>1. Do not expose your internal network.<br \/>\n2. Make sure that intermediate storage is secure.<br \/>\n3. Ensure that data at rest is protected.<br \/>\n4. Protection from data deletion, data loss.<br \/>\n5. Protection from data tampering.<br \/>\n6. Auditing and monitoring.<br \/>\n7. End-to-end network protection.\n<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Enable_transparency\"><\/span>Enable transparency<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Finally, improve transparency over tracking the whole data flow. <a href=\"https:\/\/web.archive.org\/web\/20080719202151\/http:\/\/www.ebizq.net\/topics\/eii\/features\/9466.html\" rel=\"noopener noreferrer\" target=\"_blank\">This article<\/a> on EbizQ.net suggests Data Loss Prevention (DLP) technologies as a way of securing your most valuable asset and achieving transparency through detailed monitoring. Come to think of it, transparency is the key to creating a healthy and productive environment. Even in data integration systems, <i>transparency is a neccessity<\/i>, allowing you to see where your sensitive data is going, how it\u2019s being transformed and saved, and how secure it is during these transactions. Transparency is another global asset that needs to be integrated into the corporate system of values.<\/p>\n<p><center><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-data-breach-tools-incident-2008-survey.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-data-breach-tools-incident-2008-survey-1024x636.png\" width=\"640\" class=\"aligncenter size-large wp-image-57090\" \/><\/a><small>Tools to address vulnerabilities (<a href=\"https:\/\/web.archive.org\/web\/20140513151041\/http:\/\/www.ponemon.org\/local\/upload\/file\/2008%20US%20Uncertainty%20of%20Data%20Breach%20Detection%20Final%20June%202008.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">Image credit<\/a>)<\/small><\/center><\/p>\n<p>You could say, of course, that transparency is just another vague notion (like total security and clean data), perfection hard to achieve, especially for the old market players with established processes. Hard, yes, but not impossible. It\u2019s something to go for. In the end, when your transparency efforts deliver security, it\u2019s your company that will benefit.<\/p>\n<p>So, looks like <em><i>enhance transparency<\/i><\/em> equals <em><i>improve security<\/i><\/em> now. Keep in mind, like with anything that has to do with data cleansing, integration, and migration, the right security technology eventually comes in handy.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Further_reading\"><\/span>Further reading<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/top-data-integration-challenges-regarding-dq-cdi-eai-dw-and-bi\/\">Top Data Integration Challenges: Meet DQ, CDI, EAI, DW, and BI<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/soa-risk-mitigation\/\">SOA Risk Mitigation<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/unstructured-data-a-challenge-for-it-decision-makers\/\">Unstructured Data: a Challenge for IT Decision-Makers<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<hr\/>\n<p><center><small>The post is written by <a href=\"https:\/\/www.altoros.com\/blog\/author\/alena-semeshko\/\">Alena Semeshko<\/a> and <a href=\"https:\/\/www.altoros.com\/blog\/author\/alex\/\">Alex Khizhniak<\/a>.<\/small><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Featured image credit)<\/p>\n<p>&nbsp;<\/p>\n<p>Heterogeneous data as a threat<\/p>\n<p>Ponemon Institute surveyed 870 IT professionals and found &#8220;nearly 70% feel that access to their unstructured data by employees is very often unwarranted.&#8221; Furthermore, 84% admit this data &#8220;is accessible by people with no business need for access.&#8221;<\/p>\n<p>The problem usually lies in the way [&#8230;]<\/p>\n","protected":false},"author":178,"featured_media":57088,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[960,895],"class_list":["post-49675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-opinion","tag-data-integration","tag-research-and-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ignoring Security Harms Data Management | Altoros<\/title>\n<meta name=\"description\" content=\"Threats\u2014both internal and external\u2014must be taken seriously to protect your data from unwanted access. Security experts suggest a number of recommendations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ignoring Security Harms Data Management | Altoros\" \/>\n<meta property=\"og:description\" content=\"(Featured image credit) &nbsp; Heterogeneous data as a threat Ponemon Institute surveyed 870 IT professionals and found &#8220;nearly 70% feel that access to their unstructured data by employees is very often unwarranted.&#8221; Furthermore, 84% admit this data &#8220;is accessible by people with no business need for access.&#8221; The problem usually lies in the way [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/\" \/>\n<meta property=\"og:site_name\" content=\"Altoros\" \/>\n<meta property=\"article:published_time\" content=\"2008-11-26T08:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-30T17:01:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1415\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alena Semeshko\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alena Semeshko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/\",\"name\":\"Ignoring Security Harms Data Management | Altoros\",\"isPartOf\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png\",\"datePublished\":\"2008-11-26T08:49:00+00:00\",\"dateModified\":\"2021-08-30T17:01:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/0ac460afad54a2f6640ce803b407fec8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png\",\"width\":1415,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.altoros.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ignoring Security Harms Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\",\"url\":\"https:\/\/www.altoros.com\/blog\/\",\"name\":\"Altoros\",\"description\":\"Insight\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.altoros.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/0ac460afad54a2f6640ce803b407fec8\",\"name\":\"Alena Semeshko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2019\/12\/banner_semeshko_to_the_blog_v2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2019\/12\/banner_semeshko_to_the_blog_v2-96x96.jpg\",\"caption\":\"Alena Semeshko\"},\"description\":\"Alena Semeshko is Technology Evangelist at Apatar \/ Altoros. On her blog, she covers ETL, EAI, BI, open-source, and all the aspects of data integration. Alena is focused on creating awareness, fostering a better understanding, and keeping her readers well-informed on the emerging problems and data integration practices of the day. She possesses rich intercultural experience, having lived in several countries across the globe, and is studying Korean in her spare time.\",\"sameAs\":[\"http:\/\/altoros.com\"],\"url\":\"https:\/\/www.altoros.com\/blog\/author\/alena-semeshko\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ignoring Security Harms Data Management | Altoros","description":"Threats\u2014both internal and external\u2014must be taken seriously to protect your data from unwanted access. Security experts suggest a number of recommendations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/","og_locale":"en_US","og_type":"article","og_title":"Ignoring Security Harms Data Management | Altoros","og_description":"(Featured image credit) &nbsp; Heterogeneous data as a threat Ponemon Institute surveyed 870 IT professionals and found &#8220;nearly 70% feel that access to their unstructured data by employees is very often unwarranted.&#8221; Furthermore, 84% admit this data &#8220;is accessible by people with no business need for access.&#8221; The problem usually lies in the way [...]","og_url":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/","og_site_name":"Altoros","article_published_time":"2008-11-26T08:49:00+00:00","article_modified_time":"2021-08-30T17:01:32+00:00","og_image":[{"width":1415,"height":920,"url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png","type":"image\/png"}],"author":"Alena Semeshko","twitter_misc":{"Written by":"Alena Semeshko","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/","url":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/","name":"Ignoring Security Harms Data Management | Altoros","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage"},"image":{"@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png","datePublished":"2008-11-26T08:49:00+00:00","dateModified":"2021-08-30T17:01:32+00:00","author":{"@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/0ac460afad54a2f6640ce803b407fec8"},"breadcrumb":{"@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#primaryimage","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2008\/07\/ponemon-institute-banks-security-survey-2008.png","width":1415,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.altoros.com\/blog\/ignoring-security-leads-to-huge-data-management-problems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.altoros.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ignoring Security Harms Data Management"}]},{"@type":"WebSite","@id":"https:\/\/www.altoros.com\/blog\/#website","url":"https:\/\/www.altoros.com\/blog\/","name":"Altoros","description":"Insight","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.altoros.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/0ac460afad54a2f6640ce803b407fec8","name":"Alena Semeshko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2019\/12\/banner_semeshko_to_the_blog_v2-96x96.jpg","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2019\/12\/banner_semeshko_to_the_blog_v2-96x96.jpg","caption":"Alena Semeshko"},"description":"Alena Semeshko is Technology Evangelist at Apatar \/ Altoros. On her blog, she covers ETL, EAI, BI, open-source, and all the aspects of data integration. Alena is focused on creating awareness, fostering a better understanding, and keeping her readers well-informed on the emerging problems and data integration practices of the day. She possesses rich intercultural experience, having lived in several countries across the globe, and is studying Korean in her spare time.","sameAs":["http:\/\/altoros.com"],"url":"https:\/\/www.altoros.com\/blog\/author\/alena-semeshko\/"}]}},"_links":{"self":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/49675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/comments?post=49675"}],"version-history":[{"count":33,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/49675\/revisions"}],"predecessor-version":[{"id":63210,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/49675\/revisions\/63210"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media\/57088"}],"wp:attachment":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media?parent=49675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/categories?post=49675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tags?post=49675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}