5 Best Practices to Avoid Data Leaks

Wednesday, April 11, 2018

5 Best Practices to Avoid Data Leaks


Every industry is vulnerable to having their data leaked to the public, or to hackers. If your company is looking to protect their data, you need to have the right tools and tactics in place. 


Use the following best practices to keep your data safe and away from criminals:

Network Monitoring

Each device in your office is connected to a central network. And each device sends and receives data at certain speeds and amounts. This creates many vectors in which a hacker could enter your network and make changes. From servers, to routers, to computers, to phones, you can't manage and protect your data if you are not monitoring it.

There are several managed detection and response providers who will watch your network for you. If they detect a threat, they will take action. Either they will kick the attacker off the network, lock your data down to protect, or both at the same time. It is like having a security system for your home. Hopefully, nothing would ever happen. But if something does and you don't have security and monitoring, then you are out of luck.

Firewalls

Software like antivirus is a great way to keep certain viruses out of your computer network that could steal your data. However, if you go a level deeper, you can stop the hack before it even begins. There are certain TCP/IP protocols that can block certain attacks from ever entering your data network. They are not expensive to set up and anyone in your IT department should be able to help you with it. Speaking of IT:

Related articles

IT Recruiting

Your IT recruiting will have a big effect on your ability to keep cyber hackers out. They can be trained and certified in certain threat vectors, technologies, and hardware. Depending on what set up you are using, make sure that your HR department knows they are hiring the right person for the job. If they don't have the experience in technology, then encourage your hiring managers to use a recruiting firm that does. The other reason to do this is to ensure that no one with a criminal record is working for you. You should conduct background checks and ensure that they are not going to become an internal threat will all of your passwords to crucial data.

Consulting on Threats

Don't feel like you have to do it all alone when protecting your data. There are companies out there with security experts that you can hire to help you protect it with key strategies you may have overlooked. They will not come cheaply, but the amount you invest will pale in comparison to the damage you could save yourself from if an attack occurred. For the best results, ask others in your industry for a referral to make sure the consultant knows their stuff and is trustworthy.


Silo and Air Gapping

Any bank or government will not keep all of their gold in one location. Even though they have a lot of security, they need to protect against the worst case scenario. If a thief or team of them somehow got into the storage building, they could get away with all the gold and bankrupt the entity if it was stored in the same location.

Therefore, why would you store all of your digital gold (company data) in one place? Instead, you should silo it. Use different storage centers and databases for different pieces of data in your company. This allows you to reduce risk. Also, consider air gapping certain data, wherein you disconnect it from any network at all so it is impossible to be hacked.


When it comes to modern business, nothing is more at risk than your information. All it takes is one hack to get your private information to the black market or into competitors' hands. So use the tips above and protect your data from all the threats out there.


By  Robert Cordray Embed

About the Author - Robert Cordray is a former business consultant and entrepreneur with over 20 years of experience and a wide variety of knowledge in multiple areas of the industry. He currently resides in the Southern California area and spends his time helping consumers and business owners alike try to be successful. When he’s not reading or writing, he’s most likely with his beautiful wife and three children.



0 comments:

Post a Comment