How CIA and NSA can stop data breaches in future!

Back How CIA and NSA can stop data breaches in future!

“Is my data safe?” or “Has my software development team plugged in all security issues?”

These are very critical questions for any product manager or business head to wonder since witnessing high number of data breaches in even the top most highly secured organizations. The recent leak of internal CIA documents on Wikileaks about cracking digital communications has further left many modern internet, smartphones and internet-connected devices organizations  in a state of shock.

Almost every system is now-a-days encrypted and is difficult to break without an insider job. This case of CIA leaked documents is a perfect example of insider job and it leaves me wondering that at what level would had CIA failed to curb such incidences of internal data breaches.

Lets walk the talk to understand in layman terms about how such incidences could be curbed as this is equally important for organizations like CIA or NSA or any other business that needs to keep its client and business data secured. It is my impartial view about how organizations can keep their data safe.

The rate at which data is generated is many folds compared to the rate at which a business grows. With such huge amount of data in kitty, it becomes difficult for big organizations to keep a track of data usage by users. What they need is a first layer of a robust audit tool that logs in details of each user and timestamp each of their activity with details and name of files accessed. Such system in place will promote right use of data and curb incidences of random surfing through and downloading of critical or classified data. But again, only this one tool may not be able to stop data breaches because by the time someone would have made sense of such audits and timestamps, employees like Snowden would have already accessed the classified data, downloaded in an USB and boarded a plane to another country.

The second layer of data analytics therefore becomes must to predict any such cases in advance. This involves use of machine learning and artificial intelligence where the system understands the usage pattern of each user. For example, which files the user mostly accesses, at what time in day, for what duration and many other similar parameters. With this, the system makes a digital footprint and profile of a user and could raise alarm if it witnesses a deviation from normal usage pattern. It could even be made to predict in advance the build up motion of small variances that might lead to data breach in future. It could even suggest highly vulnerable data points where additional security or permissions might be required.

Big data analytics and artificial intelligence could serve as major tools to curb such incidents of data breaches in future.

We have been the most secure document sharing startup in past as Copiun Inc. and are now back as AgileAxis Inc. to help businesses develop custom softwares with focus on data encryption and security implementation.