Sbig App
Install our App to get easy Access toBuy, Link, Renew, Claim and More
Get

Getting Small Data Right before Pursuing Big Data

blog
Dec 14, 2019
expertexpertexpert

My immediate question to most of them has always been “How are they doing on small data?” The intention of asking this question is to really understand whether an organisation has got its internal data architecture right and that the firm has been able to realise value from all the data it captures. Does the organisation, with the data that it possesses have all possible knowledge about their customers and competitors? My belief is that there is a lot that an organisations needs to achieve before it pursues projects where they start looking for insights from the outer world. Big-data is a great deliberation topic and it gets people enthusiastic and thinking about what to do with social media and other external data.However the big-data hype should not distract an organisation from the more immediate issue of how to monetize the data an organisation currently has.

I would leave you with 5 key areas an organization can work on to ensure that their internal data is being optimally utilized and value is realized.

1. Make Data part of the Business Strategy – Any organisation wanting to realise value from their data, have to start viewing data as an asset. They have to provide Data, the same treatment as provided to other organisational assetslike Finance, People and Technology/Infrastructure. The starting point for this should be to draw a linkage of Data to all strategic initiatives on the Balanced Scorecard and bringing out a dependency score to know the impact, data would have on the success of these projects or programs.

2. Who owns the data?– If you own a house or a car you have a special interest and concern about these possessions. Anything going wrong with these possessions impacts you in a big way. Similarly every organization needs to identify senior business leaders who own data and the health of the data has to be made their responsibility. Ironically in most of the organizations the accountability of data rests with IT. This does not augur well for an organization keen on optimizing value from their data. It is a recent phenomenon (3-5 years) that organizations in the US and European region have started having dedicated Information Management teams to help drive the Data agenda within an organization reporting directly to the senior management. These teams help organization manage data in a more strategic manner and drive processes which help in achieving high quality data leading to accurate and useable insights.

3. Put an enterprise level continuous data improvement process in place – Poor Data Quality is an age old challenge and despite this there are very few companies who have taken a proactive approach to arrest this issue. The mantra for getting the data right is to give a view of what the world of high quality data looks like, what the business benefits are and then show them the direction to make it happen.

4. Putting a Context to Enterprise data – An organization has many processes and every process leads to generation of data. An organization’s capability to marry the relevant data coming from processes across the organization helps arriving at an aggregate data which is more dramatic and powerful than a data set viewed in silo. Adding more contexts to data element leads to a complementary change to the understanding of meaning of the data. Contextual computing can help organizations drive enhanced customer experience, cross sell and fraud detection.

5. Get your Customer Data right – Organizations striving Customer Intimacy need to get their customer data right. The starting point would be to revisit the customer contact processes which capture these data points and carry out a root cause to understand the reasons for the poor quality data. More often than not it happens to be a culture and awareness issue and no conscious effort is being made to capture the critical customer data points. Training, Incentive programs and communication can help you set this right. Technology can help in a big way with tools (MDM) which help you achieve a 360 degree view of your customers. Poor customer data management will lead to poor customer experience leading to attrition and failed acquisition/cross sell campaigns.

An organisations approach to how they nurture and treat data as an asset would determine the success of all initiatives where data acts as the raw material or fuel.

By Anthony Devassy, Chief Data Officer, SBI General Insurance

With an experience of 13 years building expertise around Information Management - Data Governance, Business Intelligence, Enterprise Data Model & Quality, Data warehouse, Anthony is currently working as Chief Data Officer at SBI General Insurance.

This blog is intended solely for educational and informational purposes. The content may include outdated information regarding the topic discussed. Readers are encouraged to confirm the accuracy and relevance of the data before making any significant decisions. SBI General Insurance disclaims responsibility for any errors or consequences arising from the use of outdated information provided herein.

Recent Blogs

icon

Cyber Insurance

Ad Fraud: Recognize, Prevent, and Protect

In today's digital age, online fraud and cybercrime are rampant issues that affect countless internet users. One of the most pervasive forms of online fraud is ad fraud, which involves various deceptive techniques to scam internet users, leading to financial loss, identity theft, etc. Ad fraud is a huge problem for anyone who uses the internet, including anyone who is not tech savvy, advertisers, and businesses. Understanding what fraud online is, how it works, and how you can protect yourself is essential in our increasingly connected world. What is Ad Fraud? Ad fraud refers to malicious activities in which scammers create deceptive ads to trick users into clicking on them, which then leads to fraudulent websites. These fraudulent websites are designed to steal important personal information, such as login credentials and bank details, ultimately allowing the fraudsters to take money from the users' accounts. This is a massive problem for victims who are everyday internet users who unknowingly fall into these traps and suffer the consequences of compromised personal information and financial loss. Types of Ad Fraud Misleading Clicks and Links One of the sneakiest ad fraud techniques involves fraudsters creating ads that look legitimate but lead to harmful or scam websites. These ads can appear as everyday, trustworthy promotions, and when users click on them, they might be directed to sites that steal personal information or infect their devices with malware. For example, you might see an ad for a popular product on sale, but clicking it takes you to a fake store that captures your credit card details. Fake Offers and Deals Another common type of ad fraud targets users with enticing offers that are too good to be true. These ads often promise incredible discounts or free products but require users to enter personal information or payment details. Once users provide this information, fraudsters can use it for identity theft or financial fraud. A typical scenario involves an ad claiming you've won a high-value prize, but you must pay a small fee to claim it—this fee often results in unauthorised charges on your account. Impersonation Scams In impersonation scams, fraudsters create ads that look like they are from well-known companies or brands. These ads can trick users into thinking they are interacting with a reputable entity. The fraudsters might ask for sensitive information, like login credentials or bank details, under the guise of a security check or account verification. This type of ad fraud can be especially damaging as it exploits users' trust in familiar brands. Forced Redirections Some fraudulent ads use forced redirections, where clicking on an ad (or sometimes even just viewing a webpage) automatically redirects users to another site without their consent. These sites can be harmful, ranging from phishing sites that steal personal data to sites that automatically download malware onto the user's device. This kind of fraud can disrupt the browsing experience and lead to significant security risks. Fake App Installations Mobile ad fraud is a growing concern, and one method is fake app installations. Fraudsters create apps that appear legitimate but are designed to collect user data or push more malicious ads onto the device. These apps might be promoted through ads that promise useful features or exclusive content. Once installed, they can access personal information, track online activity, and serve intrusive ads that are difficult to remove. How Ad Fraud Occurs? Ad fraud occurs through a variety of sophisticated methods that exploit technical vulnerabilities and human psychology. Fraudsters use automated bots to mimic human behaviour, creating fake clicks and impressions that are hard to distinguish from genuine activity. They might also employ click farms—large groups of low-paid workers clicking on ads to artificially inflate numbers. Additionally, malicious software can be used to inject ads into web pages or redirect users to unwanted sites. Understanding these tactics is crucial for recognising and avoiding online scams. What are the consequences of Ad Fraud? Ad fraud's impact extends far beyond digital advertising; it directly affects internet users by creating a less secure and trustworthy online environment. Users might inadvertently click on fraudulent ads, leading them to malicious websites that could steal personal information or infect their devices with malware. This can result in financial loss, identity theft, and a general decrease in trust for online platforms. For everyday users, falling victim to ad fraud means potential exposure to cyber scams that can have long-lasting repercussions. How to detect Ad Fraud? Detecting ad fraud involves staying vigilant and recognising unusual patterns in your online activity. Be wary of websites that seem to generate too many pop-up ads or redirect you frequently. Monitoring your click-to-install time (CTIT) for apps can also be a tell-tale sign; if it's unusually low or high, it could indicate fraudulent activity. Use ad blockers and browser extensions to help identify and block suspicious ads. Also, regularly check your browser settings and installed extensions for any changes or additions you did not make. How to prevent Ad Fraud? Implementing Security Measures To prevent ad fraud, start by implementing robust security measures such as using anti-malware software and keeping your system and applications up to date. This helps protect against malicious software that can inject fraudulent ads into your browsing experience. Choosing Reliable Partners Make sure you only download apps and software from reputable sources. Avoid websites that offer deals that seem too good to be true, as they might be using fraudulent ads to lure you in. Always read reviews and do your research before installing new software. Regular Audits and Monitoring Audit your online activity and settings regularly to ensure nothing unusual has been installed or changed without your knowledge. Monitoring your internet usage and staying alert to any strange behaviour or performance issues can help you catch potential ad fraud early. Educating Staff and Stakeholders If you're responsible for a family or organisation, educate everyone involved about the risks of ad fraud and the best practices to avoid it. Teach them to recognise signs of fraudulent ads and the importance of not clicking on suspicious links or downloading unknown software. Role of Cyber Insurance in Ad Fraud Prevention Cyber insurance is critical in providing a safety net against the financial repercussions of ad fraud and other cyber-crimes. It can help cover the costs of recovering from an attack, including legal fees, data restoration, and even identity theft protection. Investing in a comprehensive cyber insurance plan can mitigate the risks and potential financial damage caused by ad fraud. Explanation of Cyber Insurance Cyber insurance is a unique product designed to protect individuals and businesses from internet-based financial risks. These policies typically cover data breaches, identity theft, and other forms of cybercrime. For individuals, cyber insurance can provide peace of mind by ensuring that financial and professional support is available in the event of an online attack. Benefits and Coverage Related to Ad Fraud When it comes to ad fraud, cyber insurance can offer several key benefits. It can cover the costs associated with loss due to fraudulent activity. It can also provide resources for data recovery and system repairs if your devices are compromised. Additionally, many policies offer identity theft protection, which can be crucial if your personal information is stolen through a fraudulent ad. Examples of How Cyber Insurance Can Mitigate Risks Imagine you've clicked on a fraudulent ad that infected your device with malware, resulting in significant data loss and potential identity theft. With a comprehensive cyber insurance policy, you can get assistance with data recovery, legal fees, and even credit monitoring services to protect against further identity theft. This kind of support can be invaluable in helping you recover quickly and minimising the long-term impact of the attack. Conclusion Ad fraud is a pervasive issue that affects everyone using the internet. By understanding ad fraud, recognising its various forms, and taking proactive steps to prevent it, you can protect yourself and your loved ones from the financial and emotional toll of cyber scams. One of the best ways to safeguard yourself is by investing in a comprehensive cyber insurance policy like SBI General's Cyber VaultEdge. You can get discounts of up to 40%, extensive coverage options, and protection for multiple devices, Cyber VaultEdge offers robust protection against a wide range of cyber risks, including ad fraud. Secure yourself and your family today, and enjoy peace of mind knowing you're protected against the growing threat of cybercrime. Disclaimer: The above information is indicative in nature. For more details on the risk factor, terms and conditions, please refer to the Sales Brochure and Policy Wordings carefully before concluding a sale.
icon

Cyber Insurance

Cybersecurity Challenges in Remote Work Environments

Remote work environments have become commonplace today with many companies offering work from home opportunities. However, cybersecurity concerns are equally prevalent. Investing in cybersecurity insurance is the best approach to tackle the online threats. Additionally, you need to identify the various challenges associated with remote working and take precautionary steps to avoid them. Read on to discover the various cybersecurity challenges in remote work environments and the best practices to overcome them.
icon

Cyber Insurance

Cybersecurity in Healthcare: Threats, Importance & Strategies

In the rapidly digitizing world of healthcare, protecting sensitive patient data has become increasingly challenging. The reliance on technology and digital records has exposed the sector to numerous cyber threats, making cybersecurity essential.
icon

Cyber Insurance

The Dos and Don’ts of Online Shopping

Today, the internet has transformed the way we shop. From buying groceries to high-end computers, the internet enables all sorts of purchases and transactions. However, the financial data these online shopping websites or applications possess is a goldmine for cyber attackers. If you prefer shopping online from the comfort of your home, here are a few online shopping dos and don’ts you ought to know. Online Shopping: Dos Consider these online shopping tips to reduce the risk of cyber threats. Verify the website Ensure the online shopping website is legitimate. Hackers are known to create fake websites to steal your data. If your computer signals that a particular website is unsafe, it is best to avoid that website altogether. Provide required information only While completing the online shopping steps, you only need to provide your name, address, and contact number and choose your preferred payment mode – online or cash on delivery. Besides these details, you need not provide any other information, especially your bank account details or other financial data. Choose credit card payments One of the essential online shopping dos is to opt for payment via credit card. Since you pay a cumulative bill at the end of the billing cycle, you can report potential fraudulent transactions, which the creditor may reverse upon investigation. Check account statements regularly You must track your account statements frequently, check for suspicious transactions and report them to your bank or card issuer. The sooner you report, the higher your chances of getting your money back. Online Shopping: Don’ts Avoid doing the following things when you shop online: Transferring money to bank accounts If the online seller asks you to wire the money to their account, avoid the transaction altogether. You may not receive your product after the seller has taken your money. Using public networks An important online shopping step is to avoid public networks. Cybercriminals can position themselves between you and the public network. You could inadvertently end up sending information to the hacker without realising your actions. Clicking on suspicious links Hackers use a technique known as phishing to send fake emails about discounts, lotteries, and free gifts. These emails may contain malicious links designed to manipulate you to share your financial details. Avoid clicking on any unknown links to safeguard your financial information. Refreshing payment reconfirmation pages After completing the online payment, you may have noticed that the payment confirmation page takes time to load. A vital online shopping step is to avoid refreshing the page, as it can lead to multiple charges. Online Shopping and The Role of Cyber Insurance While online shopping seems like an unparalleled convenience in this fast-paced world, it is not free of dangers. A single cybercrime can deplete your personal or business accounts within seconds, which is why you must always be alert while conducting online transactions. Investing in anti-virus software and cyber insurance proves beneficial. While the former helps screen deceitful websites, the latter safeguards you against any financial losses incurred due to cybercrimes like malware, cyber extortion, phishing, ransomware, and more. Secure your finances by investing in cyber insurance today. Disclaimer: The above information is indicative in nature. For more details on the risk factor, terms and conditions, please refer to the Sales Brochure and Policy Wordings carefully before concluding a sale.