protect your data
it’s essential to
know what data
Identify the datasets that
need the most protection
- such as those with
requirements (e.g. customer
Locate every dataset. Is it on a server?
In the cloud? Downloaded on to staff
laptops and smartphones?
Working with an IT professional to
audit your systems will make this clear.
It’s vital to train staff to be security-aware
because most data breaches are accidental.
...and many cyber attacks are
achieved with the unwitting help
of staff, e.g. persuading people
to hand over passwords.
And remember to explain to staff that
certain online activities can jeopardise
Encryption sounds more
complex than it is.
Your data can be encrypted,
end to end, meaning that no
business data is readable
by those without the correct
This can be applied to information on a whole
range of devices, so you can sleep soundly even
when your finance manager’s laptop gets stolen or
a salesperson leaves their smartphone on the train.
When disaster does strike it’s
important to have a recovery strategy.
And you need a regular routine for
backups, so systems can be rolled back
in the event of a problem.
Remember to test your backup
A formal password policy will
save you grief in the long term.
Passwords should be long, a mixture
of characters, cases and symbols and
never shared between applications.
Make sure your staff know this too.
Don’t allow staff to install
their own software on work
PCs, without good reason.
Whether it’s a useful service
that will make work easier, or simply
downloading stuff from the Internet, too much
DIY threatens the integrity of the business’s data.
To make things as simple as
possible, don’t give people
access to data they don’t need.
And make sure
don’t run in
That way, any breaches
that do occur will be
A security audit is essential for
discovering what data you have
on which systems, and where.
Staff need to know what data
must be secure, and, most
importantly, why it needs to
be kept secure. Informed staff
make better decisions.
Backups and recovery are an
essential part of data security.
What will you do if you discover
7 StepsTo Secure Your Operations
from Cyber Threats
Security of information for business matters, but with breaches on the increase, it’s more
important than ever to keep business data protected. Here are 7 easy steps to keeping it tight
Get your guide to achieving full business continuity with your IT
Keeping the Lights On: The Business Leader’s
Guide to Operations and IT
Download the eGuide now!