# The Sweet Spot of Data Security
By:: [[Brian Heath]]
2024-06-19
There are two types of data security that people worry about. The first is private information about individuals that could be used to impersonate or blackmail individuals. Governments worldwide continue to place rules, regulations, and laws to protect individual data. In general, nobody is against these rules as an individual. Organizations typically only push back due to the expenses of securing this data in line with the standard. The other type of data security that people worry about is proprietary data, which typically provides a competitive advantage. Governments also play a role here with copyrights, trademarks, patents, and intellectual property laws. However, the space is much more open to interpretation. Often, the best way to keep a secret is to not tell anyone about it. For example, Google's search algorithm is still a secret and is not protected by patents and copyrights. Alternatively, others freely share their proprietary data, as seen through the open-source movement. Thus, how one positions and thinks about their proprietary data is highly variable and value-based. In essence, one's data security posture on proprietary data reflects who one is, the game being played, and how one wishes to play the game. This is no different than broader security postures played out by individuals and governments over the ages. Partners and advisories move about the board in an infinite game of offense and defense. After much study, one will find that security is only a feeling and never a certainty. Fixating on it rarely provides any relief to the neurotic mind. Ignoring it opens one up to unnecessary manipulation and pain. The sweet spot requires playing the infinite game not to win but to keep playing the game.
#### Related Items
[[Data]]
[[Security]]
[[Games]]
[[Government]]
[[Priorities]]
[[Systems Thinking]]
[[History]]