{"id":3474,"date":"2021-02-23T07:19:00","date_gmt":"2021-02-23T07:19:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=3474"},"modified":"2026-04-20T23:00:28","modified_gmt":"2026-04-20T21:00:28","slug":"identifying-and-securing-sensitive-data","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/identifying-and-securing-sensitive-data\/","title":{"rendered":"Identifying and securing sensitive data"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3474_15fc34-1a\"><a class=\"kb-button kt-button button kb-btn3474_5defca-c5 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading3474_c33418-6b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_c33418-6b\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading3474_432321-40 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_432321-40\">Identifying and securing sensitive data<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tFeb 23, 2021\t<\/span>\r\n<\/div>\n\n\n<div class=\"kt-adv-heading3474_184cff-b1 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading3474_184cff-b1\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">1 min <\/span><\/div><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image3474_e4341d-be size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"624\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-1024x624.png\" alt=\"cartoon of 2 people looking a new data\" class=\"kb-img wp-image-51095\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-1024x624.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-300x183.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-768x468.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-1536x937.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-2048x1249.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-18x12.png 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-ogg0le is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading3474_c56bf3-69 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_c56bf3-69\">Best Practices for Data Classification and Database Security<\/h2>\n\n\n\n<p class=\"kt-adv-heading3474_d65333-dd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_d65333-dd\">Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels, from top to bottom. It can be internal as well as customer oriented. And, it can be card data that requires a whole different level of security and approach.<br>Normally database and data warehouses host an organization\u2019s data, which can entail all different kinds of information \u2013 internal, external, customer, financial \u2013 making it the most critical and probably the most important target for a potential breach.<br><br>Selecting and placing data in to the right place is crucial, especially when organizations have data with different security requirement. It becomes an even greater challenge as the business grows. Unfortunately the task of determining what constitutes sensitive data, where it is located and how to protect it, is often a stressful task for organizations and their CSOs.<br>Businesses need to be proactive when it comes to determining types of data before it lands in their databases or data warehouses. They can\u2019t protect data unless they know where it is and how it\u2019s interrelates.<\/p>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image3474_cf115c-1c size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1.png\" alt=\"\" class=\"kb-img wp-image-51096\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1-300x300.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1-150x150.png 150w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1-768x768.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-1024x1024-1-12x12.png 12w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1hr08k7 is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading3474_3f69ec-ec wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_3f69ec-ec\">Routines and a checklist (listed below) can make the process easier to handle:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blockera-block blockera-block-z8duna has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Classify data.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-139dbn2 has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Understand where the data is.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-8vyr1a has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Safeguard sensitive data in databases and protect it from unauthorized access.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-e80huu has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Segregate test and production data: Test data should be protected in a test environment and needs to stay there. Production data is the most critical.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-hb9ztf has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Maintain and audit access logs.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-12iaqs8 has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">File integrity monitoring is crucial to make logs and data tamper-proof.<\/li>\n\n\n\n<li class=\"blockera-block blockera-block-1pislm4 has-manrope-font-family\" style=\"font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.227), 16px);font-style:normal;font-weight:500\">Implement real time file access and sharing auditing<\/li>\n<\/ul>\n\n\n\n<p class=\"kt-adv-heading3474_a4b644-c4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading3474_a4b644-c4\">These are the minimum and basic guidelines for any organization to process sensitive data. These practices need to be tied in with a routine, policy or automated internal process to guarantee the execution of these security measures to secure data. These automated processes will also help organizations with their compliance process and in delivering verification to auditors.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels<\/p>","protected":false},"author":2,"featured_media":51095,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":1,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,125],"class_list":["post-3474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-sensitive-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identifying and securing sensitive data - Complior<\/title>\n<meta name=\"description\" content=\"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/identifying-and-securing-sensitive-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifying and securing sensitive data - Complior\" \/>\n<meta property=\"og:description\" content=\"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/identifying-and-securing-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-23T07:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T21:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1561\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Identifying and securing sensitive data\",\"datePublished\":\"2021-02-23T07:19:00+00:00\",\"dateModified\":\"2026-04-20T21:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/\"},\"wordCount\":338,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Data-Complior-Linkedin.png\",\"keywords\":[\"Blog\",\"sensitive data\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/\",\"name\":\"Identifying and securing sensitive data - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Data-Complior-Linkedin.png\",\"datePublished\":\"2021-02-23T07:19:00+00:00\",\"dateModified\":\"2026-04-20T21:00:28+00:00\",\"description\":\"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Data-Complior-Linkedin.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Data-Complior-Linkedin.png\",\"width\":2560,\"height\":1561,\"caption\":\"cartoon of 2 people looking a new data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/identifying-and-securing-sensitive-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying and securing sensitive data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifying and securing sensitive data - Complior","description":"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/identifying-and-securing-sensitive-data\/","og_locale":"en_GB","og_type":"article","og_title":"Identifying and securing sensitive data - Complior","og_description":"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels","og_url":"https:\/\/complior.se\/en\/identifying-and-securing-sensitive-data\/","og_site_name":"Complior","article_published_time":"2021-02-23T07:19:00+00:00","article_modified_time":"2026-04-20T21:00:28+00:00","og_image":[{"width":2560,"height":1561,"url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Identifying and securing sensitive data","datePublished":"2021-02-23T07:19:00+00:00","dateModified":"2026-04-20T21:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/"},"wordCount":338,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png","keywords":["Blog","sensitive data"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/","url":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/","name":"Identifying and securing sensitive data - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png","datePublished":"2021-02-23T07:19:00+00:00","dateModified":"2026-04-20T21:00:28+00:00","description":"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels","breadcrumb":{"@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/identifying-and-securing-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png","width":2560,"height":1561,"caption":"cartoon of 2 people looking a new data"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/identifying-and-securing-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Identifying and securing sensitive data"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin.png",2560,1561,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-300x183.png",300,183,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-768x468.png",768,468,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-1024x624.png",1024,624,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-1536x937.png",1536,937,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-2048x1249.png",2048,1249,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2021\/02\/Data-Complior-Linkedin-18x12.png",18,12,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"Data is important for every organization, it is critical, sensitive, informative, multidimensional, and it benefits all levels","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=3474"}],"version-history":[{"count":5,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3474\/revisions"}],"predecessor-version":[{"id":80633,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/3474\/revisions\/80633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51095"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=3474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=3474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=3474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}