LOGO SafeSpaceOnline 7 Critical Steps To Protect Your Data
LOGO To minimize the significant risks arising from data loss, every company should take specific preventative measures to protect their critical business data. These measures fall into two broad categories: physical security and digital security. We will identify seven critical steps to ensure your data is secure, then look at the additional protection required to keep your data available. Here, we look at physical security and the three key steps a company should take to ensure their data is protected against environmental changes and physical theft. SafeSpaceOnline
LOGO Step #1: Secure Access Protect critical computer equipment against physical theft by placing it in a separate physical space which has controlled, recorded access. Limit entrance to only authorized personnel. Step #2: Environmental Controls The space which houses critical computer equipment should be climate controlled through proper heating and air conditioning, including fail- over systems in the event of main system failure. Fire suppression and temperature monitoring with an automatic notification system should be implemented. SafeSpaceOnline
LOGO Step #3: Uninterrupted Power Ensure that backup power supplies, including surge suppression, are in place to provide power to key computer equipment in the event of a primary power failure or instability in the primary power supply. Now, we examine digital security and the four key steps a company should take to ensure their data is protected against unauthorized access. Step #4: Firewalls A firewall should be placed between the companys internal computer network and each external network access point to stop unauthorized users from gaining access to the internal network and company data. SafeSpaceOnline
LOGOStep #5: Anti-Virus SoftwareEach workstation and server in the company shouldhave anti-virus software installed and periodicallyupdated with current virus definition files. Email serversshould scan for viruses embedded in external messagesand attachments prior to relaying them to internal emailboxes.Step #6: Restrict User AccessAccess to network resources, applications and data filesshould be restricted exclusively to those employeeswith a need to access. Be sure to review user accessrights regularly to reflect changes in employeeresponsibilities and when an employee leaves thecompany, his or her login ID and access rights should beimmediately removed. In some cases, currentemployees known to be leaving the company may alsoneed to have their access rights restricted to ensure thesafety and confidentiality of company data. SafeSpaceOnline
LOGO Step #7: Passwords Ensure all passwords granting access to the companys computer network, databases and critical files are properly enforced. Passwords should be at least 8 characters in length and combine letters and numbers. Users should change their passwords at least every 90 days. Network administrator passwords should be changed every 30 days. Protection Beyond Security The 7 steps outlined above are critical as the first line of defense in protecting your data. However, it is important to be aware that data loss can still occur. Beyond data loss caused by disasters and criminal activity, data can be lost for a variety of more mundane reasons. These include application corruption, hardware failure, accidental deletion and user error. In any of these circumstances, you will need to roll back to a clean, available copy of your data. Continuous, online backup to a secure remote site provides archived and up-to-the-loss copies of data that can be quickly and conveniently recovered. With this added protection, your data is not just secure, but available and supporting your business. SafeSpaceOnline
LOGO Read more at SafeSpaceOnline.com Click to edit company slogan .
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.