DRJ Spring 2020

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 32, Issue 3

Full Contents Now Available!

Thursday, 10 August 2017 20:07

Content at Rest: Your Unrealized Threat Vector

Written by  ANKUR LAROIA

Data protection is a vast and complex space. Providers are responsible for preventing loss by inventorying and controlling said data – curating the most crucial company assets and ensuring they are secure. This also means managing and eliminating the excess, as some of the most notable security breaches in our lifetime have resulted from threat actors making use of forgotten information or “content at rest.” Edward Snowden, for example, simply accessed old, SharePoint archives of the National Security Agency (NSA) – there was no actual hack. Today, it’s not about securing the multitudes of files and content companies hoard inside their firewalls – it’s knowing the right things to secure and the right things to eliminate at the right time. Unstructured and Unsecured Breaches similar to that suffered by the NSA are not isolated incidents – the risk exists in both the public and the private sectors, because the underlying challenge is