Select Page

“Remote-Control” Data Anywhere in the World

Author: Tim Steele
Heureka is the army of Data “Drones” necessary to mitigate data privacy

How did we get here?

Remote-control data is paramount post-pandemic. It’s possible that as many as 80 million workers will continue as ‘remote,’ or at least a hybrid WFH/work-at-office arrangement. Post-pandemic legal operations are negatively impacted as well.

COVID-19 introduces an exponential increase of data risk

With the expanded remote workforce, more activity takes place outside the firewall, more data exchanges outside the firewall and structured data converts to ‘unstructured data, and that data is the target for hackers. According to Jim Boehm and James Kaplan of McKinsey, and Nathan Sportsman of Praetorian: “A broad shift toward work-from-home arrangements has amplified long-standing cybersecurity challenges. It has opened multiple vectors for cyberattacks.

The pandemic affects the workforce drastically

According to Global Workplace Analytics, only 3.6% of the employee workforce works at home half-time or more. Since 56% of the workforce had favorable work-at-home conditions prior to the pandemic, it is estimated that at least that many are working from home at this time. Estimates indicate an increase of remote workers to almost 80 million, a 1700% increase

As an indirect reference to the book by Susan M. Campbell, “From Chaos to Confidence,” one expert noted –

In the context of a much larger distributed workforce, data security necessary for data privacy is more difficult as the data is now spread to nodes where the security perimeter is questionable. And collecting data necessary for litigation and regulatory compliance is much more difficult.

Enabling Remote-Control Data

Heureka enables data classification of PII/PHI and file actions based on InfoGov principles and data collection. Data intelligence and insight are immediately available when sensitive data is at risk.

Heureka’s Indexing and Classification & Tagging capabilities afford benefits to include:

  • Disciplined, enterprise-wide file identification and classification of PIi/PHI/PCI
  • Response data for cybersecurity events and privacy requests (SAR’s/DSAR’s)
  • Global classifications to inform data-driven workflows, i.e., DLP
  • Analysis of data in-place, at rest without copying and/or moving data
  • Litigation and matter preparation and Proportionality
  • Defensible data

We’d appreciate the opportunity to give you a tour. Schedule a demo below.