‘Data integrity’ is a funny term - it sounds a bit like a character trait; there’s data with integrity, and then there’s malicious data that you just can’t trust. And really, that’s what it boils down to: how to improve data integrity
It’s important to distinguish ‘data integrity’ from ‘data security’. While data security refers to how well-protected your sensitive data is, data integrity is about how much you can trust it. You need to know that from beginning to end, the data stays reliable and consistent, even if it has to pass through several systems.
To have integrity, data has to be:
Since organisations make data-driven decisions every day, achieving data integrity is crucial. Imagine making a decision that impacts the entire organisation based on incorrect figures. And yet, a report from KPMG found that 65% of C-Level executives don’t have a high level of trust in the way their organisation uses its data.
To achieve data integrity, you need to reduce the risk of:
Here are some steps you can take improve data integrity:
Data coming from both known and unknown sources needs to be verified - whether it’s a user or another application. How do you know that it’s really that user or application that’s sending the data? Is the data accurate?
How many times have you left sensitive information in a document, on a spreadsheet, in an email or in shared folders? Then, when it needs to be referenced, you can’t remember which version is the most up to date - or where to find it!
This is why you should try to remove duplicate data on a regular basis. If yours is a small business, consider tools like Clone Files Checker, Easy Duplicate Finder or Duplicate Cleaner.
This is self-explanatory. Backing up your data regularly prevents permanent data loss. Just make sure your backups are also encrypted so that you don’t leave yourself open to a cyber attack.
To guarantee the data hasn’t been tampered with, you need to make sure only the right people have access to ita.
And don’t overlook physical access. Ameer Karim, VP and GM of Consumer IoT Security at Symantec, says that default passwords on printers are often never changed. This creates a weak link that hackers can exploit to penetrate the system. Cybercriminals can not only see the information being printed, but they can also use the access point to hack the wider network and uncover more sensitive information, including financial data (CeBIT 2018, ‘IoT Security for the Real World’).
Additionally, make sure that servers containing the most sensitive data are isolated and bolted to the floor or wall.
Audit trails are essential in the case of a data breach. For your audit trail to work it needs to:
Since your organisation is probably managing and storing data through a third-party vendor, you must make sure to audit vendors regularly. Ask them how they validate data to make it trustworthy.
Human error is often the cause of failure when it comes to data integrity. This is why it’s important to:
Every organisation is a potential target for cybercriminals. Business leaders must be alert to the current threats in order to protect their company from attack. Download our guide to learn everything you need to know about business cybersecurity and securing your business data.