Skip to Main Content

Data Security: Any Way You Like It


Having spent four years in the South during college, Waffle House has always had a special place in my heart. Luckily, I still live close to one now that I pop into for breakfast on occasion. Looking through the menu on a recent visit (as if I didn’t already know what I was going to order), something caught my eye that got me thinking about sensitive data — specifically strategies for discovering and classifying sensitive data.

If you’ve never been to a Waffle House, one of the real treats of eating there (besides the friendly staff and comforting glow of the yellow signage) is the astounding ability to customize your hash browns. Eight different toppings and 256 different combinations of how you can order them. The possibilities are practically endless, but I hasten to offer this pro tip: don’t do chili and gravy on your hashbrowns at the same time unless you have a death wish.

So, how do hash brown preferences relate to sensitive data? I’ll give a few examples and draw some comparisons:

Chunked with Ham: Identifying and Locating Sensitive Data

Ham in your hashbrowns is hard to miss, just as effective data discovery should make sensitive data easily identifiable. This process entails scanning through various databases, storage systems, and applications to pinpoint where sensitive info resides. Ham adds substance to your meal, and sensitive data adds value to your data management strategy by highlighting areas that need protection.

Smothered in Onions: Data Enrichment

Just as onions add layers of flavor, data enrichment adds layers of information to your raw data, making it more useful and insightful. This can involve adding data points, such as metadata, geolocation, or user information. These help to more accurately identify sensitive data and better understand its context within the organization.

Diced with Tomatoes: Data Categorization

Tomatoes add a burst of color and freshness, much like categorizing data brings clarity and organization. Categorization involves classifying data into different groups based on its sensitivity and importance.

Peppered with Jalapenos: Data Sensitivity Tagging

Be careful, cowboy, those peppers are hot! This is like tagging sensitive data with specific markers that denote its sensitivity level. Just as jalapenos signal spiciness and the need for a cautious approach, sensitivity tagging alerts users to handle certain data with extra care to prevent misuse or unauthorized access.

Topped with Chili: Data Monitoring and Response

Chili intensifies the dining experience just as continuous data monitoring and response heighten your security posture. This strategy involves keeping a watchful eye on data access and usage patterns, identifying any irregularities that could indicate a potential breach. The flavor of chili demands attention. Similarly, effective monitoring prompts immediate action when anomalies are detected.

So, much like these different topping options enhance the hash brown experience, a comprehensive strategy for data security involves multiple layers. LRS helps our customers by revealing critical information that needs safeguarding and by applying the proper controls and monitoring policies to that data. So, next time you get your hashbrowns chunked, smothered, diced, peppered, and topped, think of LRS. After you pop seven or eight antacids, of course!