The Founder and Chief Executive Officer of the foremost Data Management Consultancy and Training organisation – Berkeley Data Strategists, Adetokunbo Ajibola CDMP, DCAM, CDMC, has highlighted the danger of protecting untrustworthy data in organisational management in the country
Ajibola, who spoke at a conference in Lagos at the weekend, said protecting untrusted data presents several significant risks and challenges, which are crucial to understanding, especially in the context of information security and data management.
According to him, Compromised Integrity: Untrusted data may be inaccurate, manipulated, or corrupted. Protecting and using such data can lead to poor decision-making based on false or misleading information.
Security Vulnerabilities: Untrusted data can contain malicious content, such as malware or viruses. When integrated into a secure system, it can compromise the security of the entire network or system.
Compliance and Legal Risks: Using or storing untrusted data might lead to non-compliance with data protection laws and regulations, especially if the data includes sensitive personal information without proper consent or in violation of privacy laws.
Data Breaches: Untrusted data might be a source of data breaches. Attackers often use such data as a vehicle to infiltrate systems. Once inside, they can steal or compromise sensitive data, leading to financial and reputational damages.
Resource Wastage: Allocating resources to protect and manage untrusted data can be wasteful, as it diverts valuable resources from protecting data that is reliable and critical to the organization.
Difficulties in Data Analysis: Untrusted data can skew analytics and insights. When mixed with trusted data, it can lead to erroneous conclusions, affecting business strategies and operations.
Reputational Damage: Relying on untrusted data can lead to public relations issues, especially if it results in incorrect public statements, flawed products, or services.
To mitigate these risks, it’s essential to have robust data validation and verification processes in place. This includes using advanced security measures, such as encryption and access control, and implementing policies for regular data audits, quality checks, and compliance reviews. Moreover, employee training on the importance of data trustworthiness and the dangers of untrusted data is crucial.