Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementCybersecurity News

Making Data Protection an Organizational Priority

By Namrata Sengupta
Office with wall to wall windows

 Nastuh Abootalebi via Unsplash

July 31, 2025

In an era when data needs to be recognized as an asset in order to transform as a business, retrieving value from data becomes the topmost priority. As fiercely as organizations are investing in innovating new tools and techniques to get the best possible “data deal,” are they considering the risks of grabbing hold of diverse, complex and sensitive data? Should the safety of data that transforms a business not be on the priority list? 

Firstly, the perception about data protection has to change. Now that data is no longer seen as a by-product of business, the description of protection also needs to extend beyond building a defense against probable attacks. Otherwise, the data that is considered an asset can soon become a liability. 

Consider the case of Blackbaud, a California-based cloud computing provider whose customers range from nonprofit organizations to educational institutions. It faced a data breach in July 2020, which exposed personal data of more than 10,000 organizations and numerous individuals. This compromised information included Protected Health Information (PHI), bank account numbers, and Personally Identifiable Information (PII) like social security numbers. Not only did the company not implement the basic security controls such as multi-factor authentication or customer reminders to change their passwords periodically, but it also held on to the data unlawfully. 

This is an outright violation of the data minimization principle mentioned in most data protection laws, like the EU-GDPR, UK-DPA, California’s CCPA, Mexico’s LFPDPPP, Germany’s BDSG, and the Philippines' PDPA. In addition, the lack of data retention policies permitted the exfiltration to take place. In June 2024, Blackbaud was ordered to pay $6.67 million as a settlement.

Some of the orders to Blackbaud by the Federal Trade Commission included producing a comprehensive information security program, deleting the data that is no longer purposeful, creating a schedule for data deletion, and alerting the FTC of any data breaches in the future. According to the state’s (California) orders, the company was required to create a design to take backups of only necessary data and establish a secure data process. 

Turns out control over data for longer than necessary can bring in more harm instead of the much-intended hike in revenue, reputation and customers. Who would have thought getting rid of data could be the open secret to protecting data?

The Reasons Behind the Crisis

Data is not numbers existing in the virtual world. Any kind of breach of this information impacts actual people in real life. From smart cities to smart phones, everything from equipment to infrastructure relies in some way or form on data. Predicting the impact of cyber-physical security incidents, Gartner states that 75% of CEOs will be held personally liable for professional scenarios. 

Leaders who wish to build a legacy of a secure data culture in their organization need to ingrain this sentiment in their employees. A leader does not have to be a data or security expert to create a culture that puts data protection at the core. The fact that employees look up to the leaders for inspiration should be enough for leaders to initiate the change and lead by example. A periodic email or an annual reminder regarding password change or security updates cannot replace the organizational practices followed by the leaders on a daily basis. Similarly, there are a few assumptions that lead up to a Pandora’s box of penalties, such as: 

  • Not My Job: What often becomes a barrier to prioritizing data protection in the organization is a dangerous belief that securing data is the responsibility of the IT team. It not only increases the burden of the IT and security teams but also allows people of other departments to wash their hands off being accountable. This results in silos, which hampers the opportunities for cross-departmental collaboration.
  • Ground Before Global: The amount of penalties that a business has to pay in case of an attack or a breach reaches millions and billions. For major businesses, these unfathomable loads of moolah in the form of lawsuits and fines are results of violations of global data protection laws and regulations. However, blunders are a culmination of daily careless mistakes on the ground that can easily be avoided by staying transparent with the data processing activities. 

Suggestions For the Secure Path Ahead

If organizations can go to lengths to gain ownership of personal data of other people, they also need to take the onus of ensuring it’s protected at all times. Also, if the leader gets the credit for the wins, they also need to bear the brunt of repercussions that a data breach brings. The leader can contribute to the creation of policies that prioritize data protection, the implementation of secure data processing practices, and the establishment of a culture that places cybersecurity at the center. Other solutions that can be incorporated are:

  • Employee Training: An empowered workforce is a safe workforce. However, an annual learning and development program cannot serve the purpose of making data security a daily habit. Most people are aware of the usual security solutions, such as using strong passwords, multi-factor authentication, and VPNs. To encourage continuous learning, the training programs must be updated with the newer threats and security practices that can help safeguard the employees’ data. Often, such sessions either end up being boring or too technical. To make these lessons interesting, free them from technical jargon and fuse them with interactive activities to ensure more participation.
  • Proactive, Not Reactive: “$15 million payment in lawsuit settlement by Hoosier Cash App” and “$370000 ransom paid by AT&T to hackers to get data deleted” are examples of cases where organizations reacted after the personal data of their customers had already been jeopardized. However, to be a secure organization, you have to be proactive in devising security strategies, fulfilling compliance requirements, and testing the implemented security solutions. An organization should consistently monitor and analyze the efficiency of their cybersecurity posture in preventing risks to their data and reducing the impact of cyberattacks. 

Embed Compliance Into Culture

An organization might be safe today because it complies with the governing laws and regulations. But unless and until data protection is viewed as a mere compliance requirement and not a safety solution for real-life entities, it can get tough to incorporate it into the organizational culture. An organization’s commitment to data security is not demonstrated by their capability of being able to stay in business post-crisis but by ensuring they abide by their values consistently without a watchdog or a complaint. 

KEYWORDS: data privacy data protection data recovery personally identifiable information (PII)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Namrata Sengupta is a business leader with over 27 years of experience in business strategy, management, and global partnerships. As the SVP, she heads the global expansion of Stellar's software products in data erasure, recovery, and file repair. A thought leader in data privacy and destruction solutions, Namrata frequently speaks at global technology events such as the IAITAM Conference, ITAD Summit, and ADISA. She is passionate about promoting diversity and inclusion in the workplace, advocating for equality and empowerment within organizations. Namrata is a Forbes Technology Council Member, where she authors many articles related to data destruction and advocates the importance of data security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • mall decorated for christmas

    Data breach and identity protection concerns are at an all-time high

    See More
  • Deloitte Security Survey: Financial Institutions Making Identity and Access Management Tools #1 Priority

    See More
  • Making Our Ports a Priority

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing