Just in case you weren’t aware, cybersecurity is a BIG deal. With so much data being collected, transferred, stored and analyzed these days with powerful software like Power BI, it’s vital that organizations know how that data is being protected and if it’s not- the steps that need to be taken to protect it properly. According to the Symantec 2019 Internet Security Threat Report, in 2018, more than 70 million records were stolen or leaked from poorly configured S3 buckets. Off-the-shelf tools on the web allow attackers to identify misconfigured cloud resources. The report also stated that attackers also increased their use of methods, like spear-phishing, to infiltrate organizations. While intelligence gathering remains their primary motive, attack groups using malware designed to destroy and disrupt business operations increased by 25 percent in 2018. Can your organization just absorb the loss of millions of dollars worth of lost or stolen data? Probably not…so let’s take a look at the factors that need to be considered when you’re working with a lot of proprietary data and what software – like Power BI- does to comply with those strategies.

1. Data Encryption

This is Cybersecurity 101- data encryption is so important, especially when it’s in transit. All of the data that is transmitted by Power BI is encrypted using HTTPS to connect from the data source to the Power BI service. Once a secure connection is set with the data provider, THEN the data crosses the network. According to Gemalto’s Breach Level Index, a global database that tracks data breaches, during the first six months of 2018, the equivalent to 291 records were stolen every second- 99 percent of those records weren’t encrypted. When you’re working with business intelligence software like Power BI, data encryption is absolutely necessary in this world that has gone digital. Taking it a step further, Power BI also encrypts the cached data and is stored in Azure SQL Database. The pinned visuals in the Power BI dashboards are also encrypted and cached in the same database. In Power BI, data is either at rest (data that is not being used) or data is classified as in process (data that is being worked with or updated).

2. Security Compliance

Checking to see if the software you’re working with is compliant with national and regional requirements in regards to data collection and usage is another factor that needs to be considered. Power BI uses two primary repositories for storing and managing data- the Azure BLOB storage and Azure SQL Database. When authenticated users are connected to the Power BI service, the connection or any request is managed by the Gateway Role/Azure API Management, which in turn interacts on the user’s behalf with the rest of the Power BI service. This allows organizations to keep databases and other data sources within their network on-premises in a secure way while using that data in reports and dashboards. Power BI offers two types of gateways- one that allows one user to connect to sources that cannot be shared with others and another that allows multiple users to connect to multiple on-premises data sources. The on-premises data gateway is a local service that is registered with the Gateway Cloud Service through Azure Service Bus. Think of the gateway as your security checkpoint at the airport.

3. Controlled use of administrative privileges

When working with BI software, not only do we need to consider what kind of data we’re collecting, but organizations need to keep track of WHO exactly has access to that data. It’s important to know how to work with your software to ensure that only the people who absolutely need access to that data have it. In Power BI, you can provide access to Power BI artifacts to certain people within the organization and restrict views of data within reports and dashboards to specific users. This feature is absolutely necessary when users may be creating different reports for different people or clients. Not having a solution like this is a recipe for having that information fall into the wrong, unreliable hands. For example, once a dataset is published to the Power BI service, the owner assigns users to certain roles. Brilliant! Keep that list short.

In Power BI, you can enable row-level security in reports so based on the credentials of each user logging in, you can set the data they will see. Pretty nifty huh? Keeping data secure is more than just keeping it from external hackers. A lot of the breeches are due to internal employees not following best practices and not managing that data properly within the organization, so it’s best to keep access to certain information as limited as possible. Users can enable row-level security in Power BI reports by using the user tables in the model and the USERNAME or USERPRINCIPALNAME functions in the DAX expression when creating security roles. Once those parameters are set, the Power BI service passes the credentials of the user logged into the service and viewing the report or dashboard to the function and uses that value to filter the data.

4. Vulnerability Assessments

In order to protect the data you’re collecting and storing, it’s especially important to understand where the weaknesses are and how to mitigate them. Implementing a commercial vulnerability management system is imperative to a cybersecurity strategy. Just because you start out with decent cybersecurity measures in place- one can only assume that operations within an organization are subject to change, people within the organization may come and go, etc…so it’s important to check in on how secure your software is and if any adjustments need to be made. While software might have a number of provisions in place to secure that data, if an authenticated user is not using best practices and not careful, they could be potentially leaking that proprietary data without knowing it. For example, if a person who has the proper credentials connects to data sources and then shares a report or dashboard that includes that data, unauthenticated users will now have access to that data report.

5. Train your workforce

As previously mentioned, software can safeguard data by holding data behind certain gateways and holding access for certain users, but if those users aren’t trained to use that software and handle that data properly, then you’re leaving your organization and data very vulnerable. Make sure your workforce is aware of your data protection policies and what they need to do to keep that data secure – especially if you’re working with data in the cloud and on-premise. For instance, you might want to have a pow-wow with that co-worker who likes to connect to their local Starbucks’ Wi-Fi and has their password set to “password.” It would give any IT person heart palpations for days. Working with powerful software like Power BI requires training in order to use it properly and securely. It will make or break your organization.
With cybersecurity becoming a growing issue, it’s important to be aware of what and how the software you’re utilizing is protecting your data. Over the last 5 years, security breaches have increased by 67 percent, according to Accenture’s global survey- that’s huge. As cyber crimes become more advanced, it’s not a matter of if it can happen (because they can) it’s a matter of when and what measures you have in place to mitigate or block certain attacks. Cybercrime damages are anticipated to cost businesses $6 trillion annually by 2021, according to the 2019 ACR from Cybersecurity Ventures. That’s not a number to take lightly.

Keep Moving Forward with Aptude

Aptude is your own personal IT professional services firm. We provide our clients with first class resources in a continuous, cost-containment fashion.

Our support services will free up your senior IT staff from the overwhelming burden of day-to-day maintenance issues. Now they’ll have time to launch those new projects and applications you’ve been waiting for. Simply put, we can free up your resources and contain your costs. Let’s have a quick chat to discuss our exclusive services.

CONTACT US

What Are You Working On?

Looking for intelligent technological solutions? Seeking consultation on your upcoming projects? Need a quote for services? Contact Aptude’s executive team directly. It’s amazing just how much one little email can rapidly accelerate your productivity.

Guy DeRosa

Senior Vice President & Director of Operations
EMAIL GUY
p: 630.692.6700
ext. 406

Srinath Parepally

Vice President of International Development
EMAIL SRINATH
p: 630.692.6700
ext. 402

Uday Mehta

Vice President of Development
EMAIL UDAY
p: 630.692.6700
ext. 403

Michael Foster

Director of Art & Communications
EMAIL MICHAEL
p: 630.692.6700
ext. 413

Some of our Clients Include…

TravelClick Logo
Gain Time, Increase Currency, Contact Us

It’s amazing how one quick email can change your life. Give us a shout! We’ll get back to you right away with the right person for what you’re looking to accomplish.

You don't have to go into a lot of detail now, we'll dial it in later.
=
What our clients are saying…

schneider-national

Aptude provides onsite and offshore Oracle DBA support, which includes troubleshooting, back-up, recovery, migration, upgrades, and daily maintenance of Oracle database servers. Aptude has been working with our team for the past four years and we continue to use them and are satisfied with their work

Warren E., Schneider National

build

Aptude provided Build.com a Java, MySQL, Webservices and other UI based solution in the business domain of analyzing and reporting on user activities for our ecommerce website. Utilizing Omniture’s APIs to download, parse, and regenerate and upload back so that we could be more effective in our marketing. I was satisfied with their project work and delivery and would consider utilizing them for future projects.” Build.com

Dan D., build.com

ugahead

Aptude provided us with Oracle DBA migration support, including an upgrade from Oracle 11.1 to Oracle 11.2, and the project was completed on time and to specifications. The project manager and project consultants were responsive and proactive, resulting in a successful conclusion to the work. I would definitely contract with them again, and have recommended them to other technical offices at the University of Georgia.

David C., University of Georgia

wolters-kluwer

Thank you for the hard work your team has put forth to staff the contract positions at Wolters Kluwer. Aptude has consistently scored high in our supplier carding and even more important you are a vendor we can always trust. I am especially impressed with your ability to tackle our positions that other vendors have not been able to fill.

Andrea G., Wolters Kluwer