Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementLogical Security

The hidden dangers of ‘low risk’ data

By Paul Steen
multicolor wires plugged in

Image via Unsplash

August 1, 2023

In recent years, discovery and classification has become one of the most important steps to a successful data security strategy. This is because, although digital modernization has brought many advantages, one problematic side-effect has been a dramatic proliferation in shadow data, i.e. data that is created, stored or shared without oversight or governance from security teams. 

As global privacy regulations have become more stringent over the last few years, businesses have had to take the problem of shadow data more seriously in order to ensure compliance. This in turn has led to many investing more into better discovery and classification solutions. However, too often businesses fall into the trap of classifying their data and identifying which assets are sensitive, only to forget about any sort of protection for the rest. 

What needs protecting? Everything

There are various methods for handling data classification, but generally, data is classified according to its sensitivity level:

  • High sensitivity data: Data such as financial records or intellectual property that, if compromised or destroyed in an unauthorized transaction, would have a catastrophic impact.
  • Medium sensitivity data: Data that is intended for internal use only, such as emails or documents, but contains no confidential information so would be less than catastrophic if compromised or destroyed.
  • Low sensitivity data: Data intended for public use, such as marketing materials or website content.

Many businesses assume that once they have classified data into these categories, the next logical step is to put protective measures in place to safeguard their high and medium sensitivity data. Meanwhile, low sensitivity data can be ignored, as it’s intended for public use or the company won’t be fined if it gets leaked.

Homes for hackers

This assumption is not only wrong, but dangerous. Think of it like a house. If someone classified all the items in a house into high, medium, or low risk, they wouldn't remove all security measures around the low value items. That would be like locking away a laptop, but leaving the front door open 24/7 because it doesn’t matter if someone steals the rubbish bins or washing up gloves. The fact is, if someone is able to come into a house whenever they like and take a look around, it doesn’t matter if they only take unimportant stuff to begin with – they’ve been given a huge amount of insight into where and how the high value items are stored.

It’s the exact same with data. While low risk data itself may not pose any sort of risk, the fact that hackers can move in undetected and make a little home for themselves is a significant threat. Once inside, criminals can spend as much time as they want to get to know the lay of the land, where all the high risk data resides, what the security controls look like, and who the database administrators (DBAs) are. Once they have all of that information, they can choose their moment to spearphish the right employee and, bang, suddenly they’re exfiltrating reams of valuable data out the back door.

There’s no such thing as unimportant data

Although it may seem counterintuitive, prioritizing the protection of low risk data can actually end up being a better use of resources, at least to begin with. The reason for this is two-fold. The first is that, as with any IT solution, there is the potential for a new data security tool to cause breakdowns and potential outages. Should this happen, it’s far better to have it happen on low risk data than on a major data store that can bring the business to a halt if it’s unexpectedly unavailable.

The second, and more important, reason is that if security is only in place for high risk data, enterprises have to be in the right place at the right time if they’re going to stop a breach. This is because, when hackers are ready to steal the sensitive data, they don’t hang about. They get in, get the data, and get out. In contrast, monitoring low risk data is where security leaders can find all sorts of interesting stuff, because hackers are looking to play around and experiment to try and find out the best way to attack.

Stopping hackers before they strike

Driven by increased regulation around privacy, discovery and classification has become central to maintaining compliance around the world. This, in turn, has helped to address some of the issues around data security. But it would be a mistake to confuse regulatory compliance with high quality data security, as illustrated by the way each treats ‘low risk’ data. Good data security means that no data is ignored, even if it has been classified as low risk. 

Low risk data is where hackers live, watch, learn and wait for the perfect moment to shift gears and steal the crown jewels. For businesses that are serious about data security, the goal shouldn’t be to wait and try and catch them in the act but to identify them before they are ready to make their move. And the best way to do that is to monitor low risk data just as intensely as high risk. 

KEYWORDS: data breach data protection data security risk management security strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Paul steen

Paul Steen is a Principal Sales Engineer at Imperva, where he helps customers solve complex application and data security challenges and associated compliance requirements. With more than 25 years of experience in the cybersecurity industry, Paul is a frequent speaker at key IT security events, such as RSA Conference, AusCert, OWASP, and AISA. Prior, Paul worked at Check Point Software and Integris Software. He holds a Bachelor’s Degree in Education from Southern Adventist University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Coding on screen

    Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

    See More
  • gray window that says data

    The hidden risk within the surveillance industry

    See More
  • classroom full of students at desks

    The hidden cost of the cybersecurity deficit in K-12 education

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing