{"id":92,"date":"2024-08-09T08:27:02","date_gmt":"2024-08-09T08:27:02","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=92"},"modified":"2024-08-09T08:27:02","modified_gmt":"2024-08-09T08:27:02","slug":"how-to-classify-protect-and-control-your-data-the-ultimate-guide-to-data-classification","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=92","title":{"rendered":"How to Classify, Protect, and Control Your Data: The Ultimate Guide to Data Classification"},"content":{"rendered":"<div class=\"elementor elementor-33234\">\n<div class=\"elementor-element elementor-element-d9346c0 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-6fbedb5 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>In our digital world, data fuels businesses. This power brings huge responsibility. Cyber threats are real and present dangers. One data breach can destroy a company causing money problems and long-lasting harm to its name. These breaches cost a lot \u2013 $4.45 million on average in 2023. This shows we need strong protection right away.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Data classification forms the base of this protection. When you grasp and use good data classification methods, you can guard your most important asset: <em><strong>your data<\/strong><\/em>. <\/span><\/p>\n<p><span>Let\u2019s look at how to change data from a weak spot into a strong point.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-35dbcbc elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What is Data Classification?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0011f80 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Sorting data into groups based on type, content, and metadata helps companies understand their information better. This allows them to reduce risks and follow <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-governance\/\">data governance<\/a> policies effectively.\u00a0<\/p>\n<p><em>For example, a hospital may need to look at patient records with specific health problems for research purposes. A bank may also need to identify transactions associated with suspicious activities for compliance purposes.\u00a0<\/em><\/p>\n<p>Data classification standards and tools let companies find information that matters to them.\u202fIt can help to show where your most valuable data sits or what types of sensitive data your users make most often.\u00a0\u00a0<\/p>\n<p>By organizing data correctly, you can improve your organization\u2019s security and compliance efforts.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-447a88b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Why is Data Classification Important?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c6d0ec3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW81192741 BCX0\"><span class=\"NormalTextRun SCXW81192741 BCX0\">With only <\/span><span class=\"NormalTextRun SCXW81192741 BCX0\">54% of companies<\/span><span class=\"NormalTextRun SCXW81192741 BCX0\"> knowing where they keep their sensitive <\/span><span class=\"NormalTextRun SCXW81192741 BCX0\">data<\/span><span class=\"NormalTextRun SCXW81192741 BCX0\">, <\/span><span class=\"NormalTextRun SCXW81192741 BCX0\">calls<\/span><span class=\"NormalTextRun SCXW81192741 BCX0\"> for the need for a strong data classification policy. Knowing what data classification means helps protect <\/span><\/span><span class=\"TextRun Underlined SCXW81192741 BCX0\"><span class=\"NormalTextRun SCXW81192741 BCX0\">important information<\/span><span class=\"NormalTextRun SCXW81192741 BCX0\"> from being lost<\/span><\/span><span class=\"TextRun SCXW81192741 BCX0\"><span class=\"NormalTextRun SCXW81192741 BCX0\">, follow rules, and handle risks.<\/span><\/span><span class=\"EOP SCXW81192741 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0d47dcb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Protect Sensitive Information<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-09ce731 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Data classification is critical in information protection. Much data goes unsorted and unidentified within organizations, and we refer to this as dark data. This brings out the importance of a solid data classification policy.\u00a0\u00a0<\/p>\n<p>Properly classifying data will be able to protect the confidential information of any business from unwanted eyeballs but also from possible <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/what-is-data-breach\">data breaches<\/a>. Using the appropriate sensitive data classification methods ensures the protection of data depending on the level of sensitivity, thus reducing the risks.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-154f94b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Compliance with Regulations<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1a330a1 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Classification of data helps companies to apply the laws. Laws, such as the GDPR, require that companies attain certain data classification standards.\u00a0<\/p>\n<p>Understanding data classification and using data categorization helps companies stay legal and avoid fines. This involves using examples and a matrix to organize data according to the law.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-56d451b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Risk Management<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9f0087e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">D<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">ata classification<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\"> helps organizations assess and manage risks based on the <\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">types of data<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">. This<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\"> process<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\"> supports applying the right <\/span><\/span><span class=\"TextRun Underlined SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">security measures<\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\"> to reduce threats. Using <\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">data classification <\/span><\/span><span class=\"TextRun SCXW42256645 BCX0\"><span class=\"NormalTextRun SCXW42256645 BCX0\">tools is important for effective risk management in cyber security.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-737011b elementor-cta--skin-cover elementor-widget elementor-widget-call-to-action\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-cta\">\n<div class=\"elementor-cta__bg-wrapper\">\n<div class=\"elementor-cta__bg elementor-bg\"><\/div>\n<div class=\"elementor-cta__bg-overlay\"><\/div>\n<\/div>\n<div class=\"elementor-cta__content\">\n<div class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tAsset Risk Calculation\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tIn-Depth Asset Risk Calculation &amp; <br \/>Simulation with Fidelis Elevate\t\t\t\t\t<\/div>\n<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/fidelis-elevate-asset-risk-calculation\/\"><br \/>\n\t\t\t\t\t\tDownload Now\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8d92d1e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Types of Data Classification<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d45708d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW96176993 BCX0\"><span class=\"NormalTextRun SCXW96176993 BCX0\">Here is a view of the main types of data classification and their characteristics:<\/span><\/span><\/p>\n<p><strong>Public Data:<\/strong> This refers to data with no implied ownership and is freely available in the public domain. It does not require protection from unauthorized access but requires protection against unauthorized modification or destruction. Data classification examples for public data include market research data available without restriction on access or usage.\u00a0<strong>Internal Data:<\/strong> Information only for use by organization insiders, like memos, emails, and company rules. The categorization of internal data protects it and prevents moderate harm in case of its unauthorized disclosure. The data classification process for internal data uses reasonable security measures proportionate to the level of sensitivity.\u00a0<strong>Confidential Data:<\/strong> This includes sensitive information like employee reviews and vendor contracts. Deserve high protection so that this category may not be accessed by any unauthorized personnel to avoid potential damage. The methods of sensitive data classification treat this category under very strict security measures to avoid its exposure.\u00a0<strong>Restricted Data:<\/strong> This includes the most confidential and sensitive information, such as PHI and government-classified data. The data classification matrix has considered restricted data to be of the highest order of security with controlled access, for its unauthorized disclosure or change can cause substantial damage.\u00a0\u00a0\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5b5d4be elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>With respect to the <a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-healthcare\/\">healthcare sector<\/a>, HIPAA (health insurance portability and accountability act)\u202frules for classification mandate that organizations classify restricted data by sensitivity and potential impact if compromised.\u00a0\u00a0<\/p>\n<p>This data classification policy shall ensure that such data has protection according to its critical nature and potential impact.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ee6438a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification Levels<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-32e1451 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW31419469 BCX0\"><span class=\"NormalTextRun SCXW31419469 BCX0\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW31419469 BCX0\"> a look at the main <\/span><\/span><span class=\"TextRun SCXW31419469 BCX0\"><span class=\"NormalTextRun SCXW31419469 BCX0\">types of data classification<\/span><\/span><span class=\"TextRun SCXW31419469 BCX0\"><span class=\"NormalTextRun SCXW31419469 BCX0\"> levels showing why they matter and what protections they need:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-857c8bc elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aea2c57 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW91114226 BCX0\"><span class=\"NormalTextRun SCXW91114226 BCX0\">1. High Sensitivity Data<\/span><\/span><\/strong><span class=\"TextRun SCXW91114226 BCX0\"><span class=\"NormalTextRun SCXW91114226 BCX0\"><strong>:<\/strong> This covers information that could lead to dire results for a company or people if it gets exposed. This kind of data needs tight access limits and safeguards because of how crucial it is and what the law requires, including <\/span><\/span><span class=\"TextRun SCXW91114226 BCX0\"><span class=\"NormalTextRun SCXW91114226 BCX0\">GDPR data classification<\/span><\/span><span class=\"TextRun SCXW91114226 BCX0\"><span class=\"NormalTextRun SCXW91114226 BCX0\"> and other rules.<\/span><\/span><span class=\"EOP SCXW91114226 BCX0\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW267985553 BCX0\"><span class=\"NormalTextRun SCXW267985553 BCX0\">Data classification examples<\/span><\/span><span class=\"TextRun SCXW267985553 BCX0\"><span class=\"NormalTextRun SCXW267985553 BCX0\"> of sensitive info are money-related files, ideas protected by law, and login details. Putting strong <\/span><\/span><span class=\"TextRun SCXW267985553 BCX0\"><span class=\"NormalTextRun SCXW267985553 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-security\/\">data security<\/a> classification<\/span><\/span><span class=\"TextRun SCXW267985553 BCX0\"><span class=\"NormalTextRun SCXW267985553 BCX0\"> steps in place is key to <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW267985553 BCX0\">stop<\/span><span class=\"NormalTextRun SCXW267985553 BCX0\"> people who <\/span><span class=\"NormalTextRun SCXW267985553 BCX0\">shouldn\u2019t<\/span><span class=\"NormalTextRun SCXW267985553 BCX0\"> see this data from getting to it and to follow the rules.<\/span><\/span><span class=\"EOP SCXW267985553 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7f2deee elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong>2. Medium Sensitivity Data:<\/strong> This data is meant for internal use and, while it needs protection, its exposure wouldn\u2019t be disastrous. Examples include non-confidential internal emails and documents, or blueprints for buildings in the works.\u00a0<\/p>\n<p>The data classification process for medium sensitivity data involves using sensible security measures to guard against unauthorized access while keeping it usable for internal needs. Good data classification methods make sure this data is protected without slowing down the organization\u2019s work.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4a11cba elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW133830847 BCX0\"><span class=\"NormalTextRun SCXW133830847 BCX0\">3. Low Sensitivity Data<\/span><\/span><\/strong><span class=\"TextRun SCXW133830847 BCX0\"><span class=\"NormalTextRun SCXW133830847 BCX0\"><strong>:<\/strong> This group includes information meant for the public and <\/span><span class=\"NormalTextRun SCXW133830847 BCX0\">doesn\u2019t<\/span><span class=\"NormalTextRun SCXW133830847 BCX0\"> need tight protection. Some examples are public website content, job listings, and blog posts.\u00a0<\/span><\/span><span class=\"EOP SCXW133830847 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-47f6ef7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>To classify data at this level makes sure people can access it but can\u2019t change it without permission. Using a data classification matrix helps companies sort and safeguard data based on how sensitive it is and how it\u2019s meant to be used.\u00a0<\/p>\n<p>Having a clear data classification policy is important for organizing and protecting different types of data. This policy should use manual and automated techniques to ensure accuracy and efficiency.\u00a0<\/p>\n<p>Properly classifying data helps align security measures with the sensitivity of the information. This ultimately safeguards company assets and ensures compliance with regulations.\u00a0<\/p>\n<p>This process should use both manual and automated techniques to ensure accuracy and efficiency. Properly classifying data helps to align security measures with the sensitivity of the information, ultimately safeguarding company assets and complying with regulations.\u00a0<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8b9f5b2 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification Examples<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8f6b9e2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW198193143 BCX0\"><span class=\"NormalTextRun SCXW198193143 BCX0\">Here are some typical <\/span><\/span><span class=\"TextRun SCXW198193143 BCX0\"><span class=\"NormalTextRun SCXW198193143 BCX0\">data classification examples<\/span><\/span><span class=\"TextRun SCXW198193143 BCX0\"><span class=\"NormalTextRun SCXW198193143 BCX0\"> that show <\/span><span class=\"NormalTextRun SCXW198193143 BCX0\">different kinds<\/span><span class=\"NormalTextRun SCXW198193143 BCX0\"> of sensitive data and their <\/span><\/span><span class=\"TextRun SCXW198193143 BCX0\"><span class=\"NormalTextRun SCXW198193143 BCX0\">classification levels<\/span><\/span><span class=\"TextRun SCXW198193143 BCX0\"><span class=\"NormalTextRun SCXW198193143 BCX0\">:<\/span><\/span><span class=\"EOP SCXW198193143 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7c0d639 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e0e10e8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">PII (Identifiable Information): This data type includes info that can identify a person, like names social security numbers, addresses, and birth dates. Keeping PII safe is key to protect privacy and follow rules. The classification levels for PII give it a high sensitivity rating because unauthorized access or misuse could cause serious harm. <\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">PHI (Protected Health Information): PHI includes medical records, health insurance info, and biometric identifiers. Keeping PHI safe is key to follow rules like HIPAA and keep patient info private. The data classification tagging for PHI marks it as sensitive, so it needs strong security to stop unauthorized access and keep data accurate.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">PCI (Payment Card Information): PCI covers details linked to payment cards, like credit card numbers, names of cardholders when cards expire, and security codes. Companies must safeguard this data to stop money fraud and follow rules such as PCI DSS. The classification levels for PCI give it a high sensitivity rating, which means it needs tough security steps like encoding and limits on who can access it.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-923eff8 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-security-in-healthcare\/\"><span class=\"TextRun Underlined SCXW190162887 BCX0\"><span class=\"NormalTextRun SCXW190162887 BCX0\">Protecting patient health data<\/span><\/span><span class=\"TextRun SCXW190162887 BCX0\"><span class=\"NormalTextRun SCXW190162887 BCX0\"> is crucial for healthcare<\/span><\/span><\/a> providers in the U.S. <a class=\"Hyperlink SCXW190162887 BCX0\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun Underlined SCXW190162887 BCX0\"><span class=\"NormalTextRun SCXW190162887 BCX0\">HIPAA rules<\/span><\/span><\/a><span class=\"TextRun SCXW190162887 BCX0\"><span class=\"NormalTextRun SCXW190162887 BCX0\"> require tough security to stop data leaks and keep patient information private.<\/span><\/span><span class=\"EOP SCXW190162887 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ed7ea56 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">The Data Classification Process<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d837e25 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW132237781 BCX0\"><span class=\"NormalTextRun SCXW132237781 BCX0\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW132237781 BCX0\"> a look at the <\/span><\/span><span class=\"TextRun SCXW132237781 BCX0\"><span class=\"NormalTextRun SCXW132237781 BCX0\">data classification process<\/span><\/span><span class=\"TextRun SCXW132237781 BCX0\"><span class=\"NormalTextRun SCXW132237781 BCX0\">, including key ideas and terms:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f0d8524 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0dd32c4 elementor-widget elementor-widget-eael-feature-list\">\n<div class=\"elementor-widget-container\">\n<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Set Goals<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Set the aims of the data classification process. <\/p>\n<p>Pick out systems for initial classification. <\/p>\n<p>Make sure you follow rules like GDPR data classification. <\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Spot and Group Data Types<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Find data types (like customer lists, money records, PHI).<\/p>\n<p>Tell the difference between company data and public data. <\/p>\n<p>Spot data that laws control such as GDPR or <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/compliance\/what-is-ccpa\/\">CCPA<\/a> data.<\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Create Classification Levels<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Choose how many classification levels you need.<\/p>\n<p>Write down each level with data classification examples.<\/p>\n<p>Teach staff how to classify data by manually if that&#8217;s the plan. <\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Put Data Classification Rules into Action<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Create and use a full set of rules to classify data. <\/p>\n<p>Make sure everyone in the company classifies data the same way and follows the rules.\n\t\t\t\t\t\t<\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Pick Data Classification Methods<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Use both manual-sorting and computer-sorting to classify data. <\/p>\n<p>Sort by hand for data that needs a careful, case-by-case look.<\/p>\n<p>Let computers sort large amounts of data to keep things uniform.<\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-5\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Set Up Safety Measures<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Add safety steps based on how you&#8217;ve grouped your data.<\/p>\n<p>Use coding, limits on who can see what, and regular checks for weak spots to protect important data.<\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-6\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Spell Out Results and How to Use Them<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Write down steps to reduce risks and set up automatic rules. <\/p>\n<p>Use analytics on classification results to make better decisions.<\/p><\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-7\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<div class=\"eael-feature-list-title\">Keep an Eye on Things and Fix as Needed<\/div>\n<p class=\"eael-feature-list-content\">\n<\/p><p>Set up a regular process to classify new or updated info.<\/p>\n<p>Check and update the classification process often.<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-14a5716 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Methods for Classification of Data<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8f2ed5e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW44287770 BCX0\"><span class=\"NormalTextRun SCXW44287770 BCX0\">There are <\/span><span class=\"NormalTextRun SCXW44287770 BCX0\">basically two<\/span><span class=\"NormalTextRun SCXW44287770 BCX0\"> methods for classifying data with respect to its sensitivity and importance: manual classification and automated classification.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-405211f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">1. Manual Classification<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d8e4f16 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Manual classification is the process where a human makes a judgement about data to be classified against predetermined criteria. The following are the key aspects:<\/span><span>\u00a0<\/span><\/p>\n<p><span><strong>Data Classification Tagging:<\/strong> Data gets tagged as sensitive, like PII, PHI, and PCI.<\/span><span>\u00a0<\/span><span><strong>Compliance:<\/strong> This is useful in meeting specific compliance regulations, such as the GDPR data classification.<\/span><span>\u00a0<\/span><span><strong>Examples:<\/strong> Applied for legal documents, sensitive business information, other forms of critical data.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bbfb5fb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">2. Automatic Classification<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-27353d2 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Automatic classification uses technology to classify data quickly and consistently. The key aspects of this are:<\/span><\/p>\n<p><span><strong>Efficiency:<\/strong> It quickly processes huge volumes of data.<\/span><span>\u00a0<\/span><span><strong>Consistency:<\/strong> Fewer human errors and uniformity in data security classification.<\/span><span>\u00a0<\/span><span><strong>Tools:<\/strong> Leverage data classification tools with appropriate algorithms that support scalable, accurate classification.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-98419b8 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification and Compliance<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aeb8418 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Data classification facilitates compliance with data protection regulations, such as the General Data Protection Regulation, the Health Insurance Portability and Accountability Act, or the Payment Card Industry Data Security Standard.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>The majority of these regulations impose certain security measures within organizations on the <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/how-to-prevent-data-loss-strategies\/\">protection of sensitive data<\/a>, and data classification is a step that enables an organization to determine which data falls into the category.<\/span><span>\u00a0<\/span><\/p>\n<p><span>For instance, the Cloud Security Alliance requests features like data type, jurisdiction, context, legal constraints, and sensitivity; its part, PCI DSS, does not require origin or domicile tags.<\/span><span>\u00a0<\/span><\/p>\n<p><em>Let\u2019s see how you can create your Data Classification Policy:\u00a0<\/em><\/p>\n<p><span><strong>Data categorization:<\/strong> Know who the data was created by or who owns the data and which organizational unit can bring the most context to the data.<\/span><span>\u00a0<\/span><span><strong>Data classification process:<\/strong> Define at what frequency classification will take place, types of suitable data classification, and technical means for data classification tagging.<\/span><span>\u00a0<\/span><span><strong>Regulatory compliance:<\/strong> Check the applicable regulations (e.g., GDPR, PCI DSS) also, what risks are in place in case of no compliance.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0be63a0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification Challenges<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c67f503 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Following are some data classification challenges that are often faced by organizations and that may bring inefficiency in managing and protecting data.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Finding Data and Location<\/span><span>: Identification of sensitive data within an organization is typically constrained because of organizational silos and a variety of data storage systems.<\/span><span>\u00a0<\/span><span>Manual Classification:<\/span><span> Manual classification of data is time-consuming, prone to errors, and labor-intensive.<\/span><span>\u00a0<\/span><span>Inconsistency:<\/span><span> Incoherent methods and criteria of classification prevent adequate protection of organizational data.<\/span><span>\u00a0<\/span><span>Cost and Resource Constraints: <\/span><span>A holistic program of data classification may involve substantial investments in technology, people, and time.<\/span><span>\u00a0<\/span><span>Compliance Complexity: <\/span><span>The compliance landscape is increasingly complex with evolving data privacy regulations, and the need for maintaining accurate classification.<\/span><span>\u00a0<\/span><span>Organizational Resistance: <\/span><span>Resistance faced from employees in implementing data classification initiatives and attempting to change organizational behavior towards a data protection culture.<\/span><span>\u00a0<\/span><span>Data Ownership and Responsibility:<\/span><span> Lack of clear ownership and responsibility for data gives a way to confusion and can expose data.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d6ef2b5 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Best Practices in Data Classification<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-931de61 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW65461098 BCX0\"><span class=\"NormalTextRun SCXW65461098 BCX0\">Organizations need to follow the best practices in data classification to overcome and <\/span><span class=\"NormalTextRun SCXW65461098 BCX0\">optimize<\/span><span class=\"NormalTextRun SCXW65461098 BCX0\"> the related challenges in data classification:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-16ddf05 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0e3825d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Automated, Real-Time Classification<\/span><span>: Utilize available data classification tools to automate and make data classification easier. This also extends to real-time scanning and tagging of data classification based on predefined parameters.<\/span><span>\u00a0<\/span><span>Commit to Data Classification<\/span><span>: Get management approval in order to emphasize that data classification is a must across the corporation. This commitment creates a culture in which <\/span><span>data security<\/span><span> classification and protection will be of main concern.<\/span><span>\u00a0<\/span><span>Establish a Culture of Compliance with Data Privacy<\/span><span>: Train employees on their roles regarding the classification of data and protection of sensitive information. Regular training keeps privacy and security awareness part of everyday operations.<\/span><span>\u00a0<\/span><span>Collaborate with IT and Business Units<\/span><span>: Collaborate with information technology and business teams in creating a standardized data classification framework. Such collaboration ensures consistency of advice, guidance, and approval through the process of data classification.<\/span><span>\u00a0<\/span><span>Minimize storage of any excess sensitive data:<\/span><span>\u202fApply data classification techniques to mark duplicate or out-of-date data for destruction, thus improving the relatively simplified protection of data.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ac2c923 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Adoption of such best practices would manage data successfully in these organizations, ensure compliance, and maintain the organizations within better data security.<\/span><\/p>\n<p><span>Ready to master your data? Drive out the best\u2014accuracy and efficiency\u2014in classifying sensitive information with <\/span><a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\"><span>Fidelis Elevate<\/span><\/a>\u00ae.<span> Mitigate risk, ensure compliance, and drive data-led decisions. Elevate your data protection strategy today.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4683c12 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1c0cb2d e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-70820d3 elementor-widget elementor-widget-eael-adv-accordion\">\n<div class=\"elementor-widget-container\">\n<div class=\"eael-adv-accordion\">\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header active-default\">\n<h3 class=\"eael-accordion-tab-title\">How can a data classification standard help with asset classification?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix active-default\">\n<p><span>A data classification standard provides an organization with a structured approach to classifying data based on its sensitivity, value, and criticality. This will help in asset classification by:<\/span><span>\u00a0<\/span><\/p>\n<p><span><strong>Identification of critical assets:<\/strong> With data classification standards, an organization will be in a better position to identify and give priority to the most sensitive and valuable data assets.<\/span><span>\u00a0<\/span><span><strong>Improved security:<\/strong> Assets will be classified in accordance with data sensitivity, improving proper security controls for better protection.<\/span><span>\u00a0<\/span><span><strong>Simplification of compliance:<\/strong> Proper data categorization with the aim that data assets will comply with regulatory and industry standards such as GDPR and PCI DSS.<\/span><\/p><\/div>\n<\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">How to deal with imbalanced data in classification?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span>There are several strategies related to imbalanced data in classification.<\/span><span>\u00a0<\/span><\/p>\n<p><span><strong>Resampling techniques<\/strong>, either by oversampling using SMOTE or under sampling to rebalance class distribution.<\/span><span>\u00a0<\/span><span><strong>Algorithm selection:<\/strong> Choose algorithms that work fine on imbalanced datasets; examples are decision trees or ensemble methods.\u00a0<\/span><span>\u00a0<\/span><span><strong>Performance metrics:<\/strong> Metrics like precision, recall, and the F1 score over accuracy in class imbalance problems.<\/span><span>\u00a0<\/span><span><strong>Data augmentation:<\/strong> Generation of synthetic data to improve the minority class.<\/span><\/p><\/div>\n<\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What is a data classification policy?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\">\n<p><span>A data classification policy is a formal document outlining the structure for classifying data in an organization. It generally provides for the following:<\/span><span>\u00a0<\/span><\/p>\n<p><span><strong>Classification levels:<\/strong> This defines categories which would be something like public, internal, confidential, and restricted.<\/span><span>\u00a0<\/span><span><strong>Responsibilities:<\/strong> Specify who is responsible for classifying data\u2014this may be the data creators, the subject matter experts, or the data stewards.<\/span><span>\u00a0<\/span><span><strong>Procedures:<\/strong> Details how often and how the data should be classified and what type of data needs classification; methods of classification.\u00a0<\/span><span>\u00a0<\/span><span><strong>Compliance requirements:<\/strong> It confirms that data classification abides by all regulatory and industry standards, such as GDPR and PCI DSS.\u00a0<\/span><span>\u00a0<\/span><span><strong>Security measures:<\/strong> Ensure that for each level of classification, a proper sensitive information security protocol is in place.<\/span><span>\u00a0<\/span><\/p><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/what-is-data-classification\/\">How to Classify, Protect, and Control Your Data: The Ultimate Guide to Data Classification<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>In our digital world, data fuels businesses. This power brings huge responsibility. Cyber threats are real and present dangers. One data breach can destroy a company causing money problems and long-lasting harm to its name. These breaches cost a lot \u2013 $4.45 million on average in 2023. This shows we need strong protection right away.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":95,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-92","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/92"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=92"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/92\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/95"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}