Data Protection, Security and Data Sovereignty
Underlying data sovereignty laws is another dimension policymakers and the public need to consider – the economic aspect. Ultimately, these laws end up reproducing many of the old questions in protectionism vs. free trade: higher domestic investment in infrastructure and jobs, but higher prices for consumers due to it being more expensive for providers. This byline, targeted at Tier 1s, will explicitly raise the existence of this trade-off as something policymakers need to consider as a natural consequence of data sovereignty laws.
Core Security Themes Today
Zero trust is not a new concept in cybersecurity, having become popular as an alternative to traditional perimeter-based network security. The idea behind zero trust is exactly as it sounds: to create a line of defense based on limiting the amount of power any one user has through reducing their access privileges -- their “trust” in the system.
How the The Hotchkiss School Fully Protects Against Ransomware
The Hotchkiss School is an independent boarding school sprawling more than 500 rural acres in Northwestern Connecticut. Serving more than 900 staff and students across two main campuses, The Hotchkiss School operates with all of the trackings of a university. Departments range from admissions, financial aid and alumni development to entire athletic, financial and plant facilities -- there is even an active farm that provides much of the school’s food. Pair these departments with student activities, including academics, athletics, co-curricular programs, clubs and publications, and it becomes clear The Hotchkiss School is a lively and bustling campus.
Data security is a hot topic, with non-stop headlines about ransomware and data breaches. It is only natural that the closer the data is to the company, the safer a company feels. This approach has always made sense ... until the rise of cloud computing and the widespread availability of storage-as-a-service offerings with lower costs and better security than on-premises systems. Cloud 2.0 storage is here -- it is secure and cost-effective. Companies that embrace it are enjoying the benefits financially, technically, and with respect to meeting compliance requirements.
Zero Trust is not a solution as much as it is a framework for building a secure environment for your critical applications and data. An essential element of that framework is the consistent and secure backup of data -- client records, emails, instant messages, orders, invoices -- all the things that make a business run. With the advent of object storage and object lock (aka “immutability”), protecting essential data from bad actors, as well as catastrophic mistakes, is easier than ever to implement and manage.
IT budgets will always be challenging to manage due to the dynamic nature of how a business leverages its data. This creates a constant tension between innovation and essential operations. This challenge is compounded by the unrelenting growth of data and the complexity of billing created by the hyperscalers. Wasabi provides a simple, secure and high-performance cloud storage service that has enabled The Hotchkiss School to reduce its cloud storage costs, store more data, AND ensure its backups are safe from the threat of ransomware or unauthorized public exposure. Kevin Warenda, the director of information technology services, talks about why he switched from Amazon and Azure to Wasabi, how much his organization saved, and how he sleeps better at night knowing his data is safe from bad actors.