Posted on

4 Best Practices for Big Data Privacy

big data, data, data privacy, privacy, security, data security, cloud, cloud storage

Source: TechTarget


Big data is becoming a more popular method of gathering data for business purposes.  It seems like it isn’t just for storing data anymore.  As a result, more companies are using the data to gather useful information via business events.  This can be anything from reviewing contracts to finding new ways to entice potential customers to your store.  Because of this it doesn’t have the old way of doing things like passing information from the company server to data storage.  Consequently, it uses virtualization architecture to draw from large content stores and archives; as a result of finding this information, it becomes a global resource.  In turn this allows for better forecasting and predictions that might actually work. 

Sources of Privacy Concerns 

  • Quality and Accuracy of Data – How will it possibly negatively affect people in decisions being made?  How does the Internet affect data through possible bad Internet searches?  Is it possible that the scientist looking up the information might be using unverified information without realizing it? 

Best Practices in Big Data Privacy 

  1. Developing High Competency – You need to become extremely proficient in finding, buying and managing cloud services which are considered an intragyral part of big data for keeping costs down.    There are also companies that prefer not to make the investment and in its place use cloud-based applications, infrastructure, and processing power.  Anyways around it, to ensure privacy there has to be constant monitoring and audits of cloud services that your company is using.  Checking on data integrity, confidentiality and availability are all a must. 
  2. Implementing Converged Storage – It’s much more efficient and reduces possible errors.  Because of this, it increases data quality and accuracy.  There’s going to be a reducing of duplicate data being stored in the same locations and increase cost efficiency too. 
  3. Properly Sanitizing Data –  Make sure to analyze, filter, join, diagnose data at the earliest possible touch points.  It’ll make work much easier without having to go back fixing errors while saving you money in the long run. 
  4. Encourage and Invite – Make some sort of process for consumers to be able to gain access to, review and correct information already collected on them, being at no cost and user-friendly.  Ensure finding privacy policies are easy to reach.  Most of all, make sure to have an easy way for people to contact you with questions or concerns that they have.   Transparency and ease of access to be able to talk to you is key. 


Asking for the consent of gathering information is not enough now.   In conclusion, there’s so much gathering of data from others that it isn’t really a question to ask.  More on point is something like telling customers how they can restrict the use of their information or delete it.  Consequently, it’s not something that all companies would offer to their customers, therefore you should try it.  This is something that most likely is going to become a requirement for companies to tell customers in the future.  It seems that enabling privacy using best practices is going to be your best bet.  Most noteworthy it will help to increase the levels of trust and transparency that you and your customers will have in the long run, while saving money at the same time. 

Posted on

Top 3 Cybersecurity Trends (via iamwire)

cybersecurity, security, cloud, iot, internetofthings, hackers, allowing hackers

Source: iamwire


Keeping up with cybersecurity measures to keep your computer and system safe is becoming more and more difficult.  Hackers are coming up with new and unusual ways to break into systems all the time.  Sometimes it’s for work, sometimes it’s for fun and sometimes it’s for criminal purposes.  The thing is, if you want to have a reputation for being a safe online store where people can visit and shop without fearing that their data will be taken, then you always have to be on top of what’s going on in the cybersecurity world. 

Just some statistics from 2016 to help show how important cybersecurity is today.  It’s a little outdated, but it gets the point across.   

  • 18 million new malware samples were taken in the 3rd quarter alone. 
  • In the year 2016, there were 400 ransomeware attacks every day. 
  • 78% of people still click on unknown links even though they know about the danger of doing this.  

3 Cybersecurity Trends  

  1. More IoT for Business Operations – The Internet of Things is becoming more popular every day in working environments.  Because of this, it’s making corporate networks vulnerable as there are so many windows where attacks can come through now.  These devices being used for IoT are not secure, allowing hackers to make programs and fake apps that people might download to make work easier, not knowing that they are allowing hackers entry into the system.  Vigilance is key to predict and find where an attack is happening. 
  2. Mobile Threats are Rising Smartphones are the PDA of the ’90’s.  Hackers can use these phones and are using them to spy, use extortion and steal data from companies.  As the smartphone becomes more popular as a tool when offsite, working from home, or in the company, it allows for many more types of opportunities for criminal hackers to gain entry. 
  3. Security of the Cloud –  As the cloud is becoming popular as a place to store all sorts of data, make sure to check the security being used by the company you’re working with.  If their security isn’t up to date, it doesn’t make sense to use them as your data will be vulnerable to attacks.  Make sure to look up their security policies and see when they conduct updates so you get a better idea of how well they take security seriously.  If it isn’t to your standards, then keep shopping.  There are lots of third-party vendors out there dealing with cloud environments.  Also make sure to manage the cloud program after implementing it, along with login credentials.  If either is being poorly taken care of, hackers will find a way in.  


Invest in an upgrade, making your company safer for your employees and shoppers to work and shop there.   They will appreciate it and so will you in the long run.  Better to spend the money this way instead of having to hire someone to come and fix your system after being infected by an attack. 


Posted on

A New, Agile Approach to Security (via WIRED)

cyber security, Agile security, computer security, security

So, your company has fully internalized the message that businesses need more agility. You’ve made the most of cloud-based computing, an agile workforce and have gotten your employees to think like disruptors.  You’re on the road to enabling enterprise Digital Transformation. There’s just one issue: Security. It turns out that hackers have already…

Source: WIRED

This article is very interesting as it deals with what we are all concerned about today and that is security.  Hackers are very agile, so why can’t we be?  That is a big security risk  that has to be reviewed and strengthened.  Hacking is a huge issue that we have to try to mitigate if possible.