Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare SolarWinds RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Data Data Anonymization Techniques
Data

Data Anonymization Techniques

By SolarWinds MSP
28 June, 2019

Businesses within the healthcare, retail, digital media, financial industries, and beyond rely heavily on data containing personally identifiable information (PII). It’s what makes advancements in technology and research possible. But while personal data has led to so much good, it can, if put into the wrong hands, jeopardize the security of millions of individuals across the globe. 

Cybersecurity breaches are on the rise—cybercriminals will steal an estimated 146 billion records by 2023. GDPR, HIPAA, PCI DSS, and state-specific regulations, like the California Consumer Privacy Act, have emerged and evolved to address these growing security concerns. That means data-collection practices and protocols have to comply with these regulations—and managed services providers (MSPs) need to help ensure their customers are practicing appropriate, secure data collection.

    DOWNLOAD our free ebook and find out how you can protect customer data in an increasingly regulated environment…

    Turning Data Protection Into a Game Changer

    What does data anonymization mean?

    Data anonymization is the process in which identifiable information, like age, gender, name, etc., is changed or removed from a set of data so that it is impossible, or nearly impossible, to determine the individual the data belongs to. It is commonly referred to as “data sanitization” or “data masking.” 

    Any industry that relies on the collection of sensitive, personal information must practice some form of data anonymization. The level of anonymization varies depending on the nature of the business, the type of data collected, and whether the data is shared publicly or privately as a controlled release to a designated group of recipients. While certain elements of data must remain intact to provide value, data must be anonymized enough so that, if a breach does occur, the hackers cannot reap any benefits from the information. Properly anonymized data has no direct personal identifiers, such as names, addresses, social security numbers, or telephone numbers. It also contains no indirect identifiers, including place of work, salary, or diagnosis, that can be linked together to identify an individual. 

    Similar to anonymization, pseudonymization is used to protect sensitive, personally relevant information. Pseudonymization, however, does not remove all identifying information, but enough so that identifying an individual from what’s left would prove extremely difficult, if not impossible. Both anonymization and pseudonymization are important to GDPR regulations. 

    Common examples of data anonymization include: 

    • Medical research: Healthcare professionals and researchers looking to examine data pertaining to the prevalence of a particular disease among a specific population would perform data anonymization. This ensures they protect patients’ privacy and remain compliant with HIPAA standards. 
    • Marketing enhancements: Many online retailers want to improve how, and when, they communicate with their customers through emails, social media, digital advertisements, and their website. To improve their services and meet rising demand for custom or unique user experiences, digital agencies rely on insights gleaned from consumer data. To reap relevant information while remaining compliant, these marketers and analysts must leverage data anonymization. 
    • Software and product development: Developers often rely heavily on realistic data to develop new tools that can improve efficiencies, solve new challenges, and enhance service offerings. This data must be anonymized so that if a data breach does occur, highly personal information isn’t jeopardized. 
    • Business performance: Many large corporations gather employee-related data to optimize performance, increase productivity, and improve employee safety. Through data anonymization and aggregation, these companies can get the valuable information they need without making employees feel judged, monitored, or exploited. 
    CTA Image

    SolarWinds Threat Monitor Contact Sales

    Contact A SolarWinds Threat Monitor Solution Specialist today.

    Contact Sales

    How to anonymize data

    There are a number of data anonymization techniques out there. While many of these methods are designed to sufficiently mask data, some may need to be used in conjunction with others to ensure both direct and indirect identifiers are anonymized. A few of the most common data anonymization methods include: 

    • Character masking: In character masking, or “masking out,” the format of the data is maintained, but select characters are replaced with a mask character, such as “x” or “#.” An example of character masking would be changing the birthdate 3/24/1955 to ##/##/19##.
    • Data shuffling: Also known as data swapping, this technique involves rearranging data so that data attributes remain present but do not correspond with their original records. Data shuffling is often equated to the shuffling of a deck of cards. This method is effective when there is no need to evaluate data based on relationships between the information contained within each record. 
    • Data substitution: With substitution, data from a column is completely replaced with random values from a list of fake, but similar-looking, data. For example, last names may be swapped out for other, nonrelevant last names, or credit card numbers may be replaced by a random string of 16 numbers. To properly leverage this method, users must have lists with equal to or more than the amount of data they are trying to anonymize. 
    • Generalization: Generalization works by eliminating the specificity of data and replacing it with more general, yet still relevant, information. This is often achieved through the use of ranges. Instead of saying 33 years old, generalized data might say an individual is between 30 to 40 years old. For addresses, only road names may be listed. 
    • Number and date variance: Algorithms can be used to change the value of numeric data by random percentages. This small step can make a big difference if implemented appropriately.
    • Scrambling: In proper scrambling, letters are mixed and rearranged so intensely that the original data cannot be determined. A simplified example of this is turning the name “Daniel” into “Leniad,” “Jacqueline” into “Qcaelneiju,” and so on. 
    • Numeric blurring: Rather than entirely masked, blurred data values are changed so they’re just enough off of their actual value that the individual's identity is protected. Numeric blurring can be performed in a number of ways, including reporting rounded values or group averages. 
    • Suppression: In certain cases, data columns and/or records may exist within a data set that do not aid the data evaluator in any way, but do contain identifying information. In these cases, it’s best to suppress, or remove, the columns and/or records. It is important that data is completely removed from the spreadsheet, versus simply hidden.
    • Synthetic data: Unlike other data anonymization techniques, synthetic datasets are imitation versions of actual data rather than modified data. These synthetic datasets have many things in common with the actual data, such as format and relationships between data attributes, and are leveraged when a large amount of data is needed for system testing and actual data can’t be used. 

    Risks associated with data anonymization

    While data anonymization can lead to great progress for companies across sectors, it is not without its limitations and risks. If executed incorrectly or with weak algorithms, poor anonymization can result in:

    • Identity disclosure: Also known as singling out, identity disclosure is the term used to describe situations in which it is possible to identify all or some of the individuals within a dataset. 
    • Attribute disclosure: Attribute disclosure is the ability to determine if an attribute within a dataset is held by a specific individual. For example, an anonymized set of data could show that all employees within the sales department of a particular office arrive after 10 a.m. If it is known that a particular employee is within the sales department of this office, you know that they arrive after 10 a.m., even if their specific identity is masked within the datasets. 
    • Linkability: Linkability refers to when it is possible to connect multiple data points, whether in the same dataset or separate datasets, to create a more cohesive picture of a specific individual.
    • Inference disclosure: Inference disclosure occurs when you are able to confidently make an inference about the value of an attribute based off other attributes.

    Proper data anonymization can be time consuming and challenging, but it’s imperative that these techniques are performed accurately, by experienced professionals, if companies want to maintain regulatory compliance and ward off attackers. There are a number of data anonymization tools and software out there that can help companies overcome data anonymization hurdles and securely reap the many benefits data collection has to offer. 

    Read our blog for more on these tools and additional techniques to monitor and protect your data.

    Try Remote Monitoring & Management Today

    Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

    Start your Free Trial

     

     

    Additional reading

    The Average Cost of a Data Breach in 2020
    Seven Common Types of Security Breaches and How to Prevent Them
    Cybersecurity Best Practices: A Guide for MSPs and Enterprises
    You might also like...
    Data

    The Average Cost of a Data Breach in 2020

    Data

    Comparing ReFS vs NTFS

    Data

    Types of Database Encryption Methods

    Data

    Data Loss Prevention Methods

    Cybersecurity

    Top 10 Cyberattack Vectors and Mitigation Tips: Part 1

    MSP Business

    SolarWinds MSP Survey: Companies still failing on the security basics

    Want to stay up to date?

    Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

    Loading form....

    If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

    Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

    Recent Posts
    • Three things I learned working for an MSP
    • Earning word-of-mouth referrals for your IT business
    • Backup automation part 1: Deploying backup devices
    • Ultimate Guide: MySQL Backup
    • Most common automation requests and how to solve them: Ep 2
    Categories:
    • Security (240)
    • Tips & Advice (130)
    • Best Practices (97)
    • Backup & Disaster Recovery (96)
    • Managed Services (89)
    • The Head Nerds (82)
    • Business Growth (79)
    • IT Support (43)
    • Business (41)
    • Automation (40)
    • Operations (38)
    • Cybersecurity (37)
    • Mail (33)
    • Remote Management (30)
    • ITSM (26)
    • Networking (22)
    • Cloud Computing (21)
    • Data (21)
    • Marketing (15)
    • PSA (13)
    • Product (11)
    • Service Desk (6)
    • Services & Support (5)
    • Mobile (4)
    • Risk Intelligence (4)
    • GDPR (3)
    • Internet of Things (3)
    • Customer Service (3)
    • Research & Trends (2)
    • Training (2)
    • Business Risk (1)
    • LOGICcards (1)
    • Cybersecurity Awareness Month (1)
    Show moreless
    SolarWinds MSP

    Products
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • SolarWinds EDR
    • SolarWinds MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
    • SolarWinds Passportal
    • All Products Use Cases
    Solutions
    • Security Solutions
    • Monitoring Solutions
    • Efficiency Solutions
    • Identify which RMM solution is right for me
    • Drive Efficiency with Automation
    • Manage my MSP Business More Efficiently
    • Manage my IT Department More Efficiently
    • Layered Security
    • Cross-Platform Support
    • Data-Driven Insights
    About
    • About Us
    • Careers
    • Newsroom
    • Leadership Team
    • Upcoming Events
    • Subscription Preferences
    • SolarWinds
    • SolarWinds Trust Center
    • COVID-19 Response
    Support
    • SolarWinds RMM
    • Solarwinds N-central
    • SolarWinds Backup
    • SolarWinds Mail Assure
    • SolarWinds Take Control
    • SolarWinds MSP Manager
    • Solarwinds Risk Intelligence
    • Solarwinds Threat Monitor
    • SolarWinds Passportal
    • SolarWinds Take Control Downloads
    • Backup & Recovery Downloads
    • Service Status

    Footer 2

    • Legal Documents
    • Privacy
    • California Privacy Rights
    • Security Information
    • Sitemap

    © SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
    All Rights Reserved.