Linking In The Chain: Security Approaches You Need To Take

The facts are clear as day. Protecting our businesses is becoming increasingly more difficult with every passing year. We read in the news about the latest data breach, with the amount of personal information getting leaked, that from either side of the fence, customer or company, it doesn’t instill any modicum of trust. What can we do to increase the amount of protection on all fronts? There is the small question of having the best tech and up to date antivirus software, but it goes much deeper than that, we need to be making sure that we are doing the little things to keep us protected.

While we need to have the right antivirus software and make sure that our firewalls are running efficiently, we need to be prepared if our layers of protection are not enough. This is where a disaster recovery system should be implemented. We are at risk of losing our data without any failsafe plan to back it up. No data, no trading, and then there is no company. While the standard antivirus packages should be enough to protect the information, having a backup plan for the worst possible scenarios is something that you need to bear in mind. The amount of cyber terrorism that occurs every single day should make you sit up and take notice. And, if the very worst situation arises, you will need to have a business continuity plan in place. This is a document giving you step-by-step information to preventing your business from any type of attack.

The other approach is communicating proper safety practices to your employees. A few examples include:

  • Changing your passwords on a regular basis. It is recommended that you change your access password every two weeks to a password that is difficult to hack into. Use numbers, symbols and unorthodox arrangements of letters to make it more difficult to guess.
  • Being vigilant when it comes to emails from an unreliable source. So many emails now have attachments which we open without reading, and these can prove to be so detrimental to a company’s infrastructure that we need to communicate to our staff how to recognize an email from a questionable source.
  • Disposing of sensitive data properly. If you have made paper notes of customer details, they need to be disposed of in a safe and lawful manner. Installing bins that are purely for the purpose of information of this caliber is a sensible approach to take, or by assigning one person to do a check at the end of the day on everyone’s desks.   
  • Locking away your work. There are so many people that leave themselves open to data theft by just leaving important documents on their desk. Lock them away in a secure place or, if it is on your computer, lock the screen.

While the methods of data theft have become mainly via computers, there are still rogue members of staff or people willing to steal documents to sell them. Vigilance is a tool just as useful as an antivirus package.

 


Leave a Reply

Your email address will not be published. Required fields are marked *