SlideShare a Scribd company logo
Muslim university of
Morogoro
Corse name: Office Management
Corse code: IBFT/PLMT/BAT: 05207
Techniques of business data protection
• Many companies keep sensitive personal information of customers or
employees in their files or on their network. Having a sound security
plan in place is to collect only what you need, keep it safe, and dispose
of it securely can help you meet your legal obligations to protect that
sensitive data.
• When managing your network, developing an app, or even organizing
paper files, sound security is no accident. Companies that consider
security from the start assess their options and make reasonable
choices based on the nature of their business and the sensitivity of the
information involved. Threats to data may transform over time, but the
fundamentals of sound security remain constant.
Techniques of business data protection
• The federal trade commission has provided a guideline to all
businesses on how to protect personal information collected for the
business purposes, whereby they outlined that business have to know
what personal information's need to be collected and what information
have already stored in files and computers, further FTC advices that
business have to keep information’s only when they have a business
use with and destruct or destroy all information they no longer need,
very soon.
• Now we are going to discuss what strategies advised by FTC that
businesses may adhere with to stay safe from unnecessary legal debts.
Techniques of business data protection
Start with security
This technique requires that, as sensitive information pervades
in all most all part of the business or company, business executives
have to urge their personnel on securing information available in all
part of the business, further, not only available data need to be
protected but also in order to start with security, executives have to
make sure departments makes reasonable decisions on what
information's business need in order to refrain from collecting
insignificant information into the business, by factoring this,
business will not encounter any legal obligation, therefore starting
with security requires that business have to collect information's that
are relevant to business, keeping information's that have business
uses, and use policies (namely it should be clear on who have
legitimate right to access particular business information to avoid
compromises). FTC suggests that to start with security business have
Don’t collect personal information you don’t need.
This tip need that, as business can’t operate without relevant
information’s employees have to not collect information’s that
are not relevant, namely they have to make sure all
information’s given have significant use in the business
Hold on to information’s that have a legitimate business need.
Sometimes it’s necessary to collect personal data as part of a
transaction. But once the deal is done, it may be unwise to keep
them, thus the best decision that can be made by savvy company on
irrelevant information’s available in the business is to destroy them
as soon as they become detected.
Don’t use personal information when it’s not necessary.
It’s worth that, information’s collected from all sources are
kept and used when and where necessary to use them, as the
matter of fact, using data where not necessary creates
irrelevant risk, whilst it can be prevented.
Techniques of business data protection
Control access to data sensibly.
Once you’ve decided you have a legitimate business need to
hold on to sensitive data, take reasonable steps to keep it secure.
You’ll want to keep it from the prying eyes of outsiders, of course,
but what about your own employees? Not everyone on your staff
needs unrestricted access to your network and the information
stored on it. Put controls in place to make sure employees have
access only on a “need to know” basis. For your network, consider
steps such as separate user accounts to limit access to the places
where personal data is stored or to control who can use particular
databases. For paper files, external drives, disks, etc., an access
control could be as simple as a locked file cabinet, When thinking
about how to control access to sensitive information in your
possession, consider following tips that support this technique.
Restrict access to sensitive data.
If employees don’t have to use personal information as part
of their job, there’s no need for them to have access to it.
This tips suggest that employs in your company are not
required to be believed all times as they can collude with
other person out side organization for their individual
benefits, thus its urged that executives have to make sure
information’s are only accessible to those who have relevant
use to them.
Limit administrative access.
Administrative access, which allows a user to make system-
wide changes to your system, should be limited to the
employees tasked to do that job, means that it is non worth
all employees to be able to access admin system for
Techniques of business data protection
Require secure passwords and authentication.
By having sensitive personal information stored on your
network, strong authentication procedures – including sensible
password “hygiene” – can help ensure that only authorized
individuals can access the data, thus without strong password and
authentication procedure pry individual may access information and
use on non legitimate use, through by as the matter of fact company
will bear legal consequences on any thing bad happening through
used information’s. therefore for a savvy company to avoid this
practice from happening has to make sure the following tips are
taken into account
Insist on complex and unique passwords.
“Passwords” like 121212 or QWERTY aren’t much better than
no passwords at all. That’s why it’s wise to give some thought
to the password standards you implement. Password is very
important on data protection however for more security a
password should be strong enough that pry can not guess it
easily, thus executives must always insist their employees to
create and build heavy pins on their files and devices which
contains important business data.
Store passwords securely.
Don’t make it easy for interlopers to access passwords. It’s
clear that having password is one step of securing
information’s not to be accessible easily but without keeping it
properly in a safe and secure place still intended goal wont be
reached any more. Thus it is imperative to have a tendency of
reminding each time on storing password in a very preferable
Techniques of business data protection
Guard against brute force attacks.
Hackers use automated programs that perform a similar
function. These brute force attacks work by typing endless
combinations of characters until hackers luck into someone’s
password, thus its of great importance to set the number of
attempts that one has to try when opening the file or device,
by that it can be easy to prevent hackers from continuous
trying to open and logging in into your data for his or her
illegitimate use of data once obtained. Therefore businesses
have to suspend or disable user credentials after a certain
number of unsuccessful login attempts. By not adequately
restricting the number of tries, the companies placed their
networks at risk
Protect against authentication bypass.
Locking the front door doesn’t offer much protection if the
back door is left open.
Techniques of business data protection
Store sensitive personal information securely and protect it
during transmission.
Storing sensitive data is a business necessity. And even if you take
appropriate steps to secure your network, sometimes you have to
send that data elsewhere. Use strong cryptography to secure
confidential material during storage and transmission. The method
will depend on the types of information your business collects, how
you collect it, and how you process it. Given the nature of your
business, hence to support this the following ways need to be
accountable for success.
Keep sensitive information secure throughout its lifecycle.
Data doesn’t stay in one place. That’s why it’s important to
consider security at all stages, if transmitting information is a
necessity for your business.
Techniques of business data protection
Use industry-tested and accepted methods.
When considering what technical standards to follow, keep in mind
that experts already may have developed effective standards
that can apply to your business. Savvy companies don’t start from
scratch when it isn’t necessary. Instead, they take advantage of that
collected wisdom.
Ensure proper configuration.
Encryption – even strong methods – won’t protect your users if
you don’t configure it properly. Thus configuration is
worthwhile as it can dissimilate you from other individuals
design of data protection, it means that if you design your own
configuration will prevent interlopers from get information's
already pinned from the start.
Techniques of business data protection
Segment your network and monitor who’s trying to get in
and out. When designing your network, consider using tools like
firewalls to segment your network, thereby limiting access between
computers on your network and between your computers and the
internet, by doing so you are likely to be safe somehow, thus it can
be easy to detect any one who is accessing data and one who is from
accessing them. Hence by having this ability you can eliminate that
one you don’t want to have access to your data. Following are ways
of giving strength this technique.
Segment your network.
Not every computer in your system needs to be able to
communicate with every other one. You can help protect
particularly sensitive data by housing it in a separate secure
place on your network if possible.
Monitor activity on your network.
Who’s that knocking on my door?” That’s what an effective
intrusion detection tool asks when it detects unauthorized
activity on your network. Thus having ability to detect any one
intends to get in your network without permission is of value be
course you are able to allow him or not if you wont it be and make
him leave the network. Also if let say one got in your network
without any notice at early place and leave any changes in your
activity by having this intrusion detection tool you will be able to
know any changes that made in your activity and correct it
immediately.
Techniques of business data protection
Secure remote access to your network.
Business doesn’t just happen in the office only, as a mobile
workforce can increase productivity, it also can pose new security
challenges on another side. Thus if you give employees, clients, or
service providers remote access to your network, you have to taken
steps to secure those access points
Ensure endpoint security.
Just as a chain is only as strong as its weakest link, your
network security is only as strong as the weakest security on a
computer with remote access to it.
Put sensible access limits in place.
Not everyone who might occasionally need to get on your
network should have an all access, backstage pass. That’s why
Techniques of business data protection
Apply sound security practices when developing new
products.
So you have a great new app or innovative software on the
drawing board. Early in the development process, think through how
customers will likely use the product. If they’ll be storing or sending
sensitive information, you have to ask your self that, is your product
up to the task of handling that data securely?
Train your engineers in secure coding.
Have you explained to your developers the need to keep
security at the forefront?
Follow platform guidelines for security.
When it comes to security, there may not be a need to reinvent
the wheel. Sometimes the wisest course is to listen to the
Techniques of business data protection
Verify that privacy and security features work.
If your software offers a privacy or security feature, verify that
the feature works as advertised.
Test for common vulnerabilities.
There is no way to anticipate every threat, but some
vulnerabilities are commonly known and reasonably
foreseeable
Techniques of business data protection
Make sure your service providers implement reasonable
security measures.
When it comes to security, keep a watchful eye on your service
providers – for example, companies you hire to process personal
information collected from customers or to develop apps. Before
hiring someone, be candid about your security expectations. Take
reasonable steps to select providers able to implement appropriate
security measures and monitor that they’re meeting your
requirements.
Put it in writing. Insist that appropriate security standards are
part of your contracts
Verify compliance.
Security can’t be a “take our word for it” thing. Including
Techniques of business data protection
Put procedures in place to keep your security current and address
vulnerabilities that may arise.
• Tips
Techniques of business data protection
ix) Secure paper, physical media, and devices. Network security is a
critical consideration, but many of the same lessons apply to paperwork
and physical media like hard drives, laptops, flash drives, and disks.
some things to consider when evaluating physical security at your
business
• Tips
• Securely store sensitive files. If it’s necessary to retain
important paperwork, take steps to keep it secure.
• Protect devices that process personal information. Securing
information stored on your network won’t protect your
customers if the data has already been stolen through the device
that collects it.
Techniques of business data protection
• Dispose of sensitive data securely. Paperwork or equipment
you no longer need may look like trash, but it’s treasure to
identity thieves if it includes personal information about
consumers or employees
•
• THANK YOU

More Related Content

Similar to TECHNIQUES DATA PRO.pptx

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
#TheFraudTube
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Apurva323420
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec
 
Digital Trust in the Work Place
Digital Trust in the Work PlaceDigital Trust in the Work Place
Digital Trust in the Work Place
Bahaa Al Zubaidi
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
rtodd599
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
RossMob1
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
GFI Software
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
EffOne_Technologies
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
ThrottleNet, Inc
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Enterprise Wired
 

Similar to TECHNIQUES DATA PRO.pptx (20)

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Digital Trust in the Work Place
Digital Trust in the Work PlaceDigital Trust in the Work Place
Digital Trust in the Work Place
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
 

More from HAFIDHISAIDI1

CAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposesCAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposes
HAFIDHISAIDI1
 
Cost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision makingCost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision making
HAFIDHISAIDI1
 
Lecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.pptLecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.ppt
HAFIDHISAIDI1
 
Lecture 3.ppt
Lecture 3.pptLecture 3.ppt
Lecture 3.ppt
HAFIDHISAIDI1
 
Lecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.pptLecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.ppt
HAFIDHISAIDI1
 
13247355.ppt
13247355.ppt13247355.ppt
13247355.ppt
HAFIDHISAIDI1
 
lecture three.pptx
lecture three.pptxlecture three.pptx
lecture three.pptx
HAFIDHISAIDI1
 
Lecture one.pptx
Lecture one.pptxLecture one.pptx
Lecture one.pptx
HAFIDHISAIDI1
 
lecture two.pptx
lecture two.pptxlecture two.pptx
lecture two.pptx
HAFIDHISAIDI1
 

More from HAFIDHISAIDI1 (9)

CAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposesCAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposes
 
Cost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision makingCost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision making
 
Lecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.pptLecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.ppt
 
Lecture 3.ppt
Lecture 3.pptLecture 3.ppt
Lecture 3.ppt
 
Lecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.pptLecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.ppt
 
13247355.ppt
13247355.ppt13247355.ppt
13247355.ppt
 
lecture three.pptx
lecture three.pptxlecture three.pptx
lecture three.pptx
 
Lecture one.pptx
Lecture one.pptxLecture one.pptx
Lecture one.pptx
 
lecture two.pptx
lecture two.pptxlecture two.pptx
lecture two.pptx
 

Recently uploaded

Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 

Recently uploaded (20)

Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 

TECHNIQUES DATA PRO.pptx

  • 1. Muslim university of Morogoro Corse name: Office Management Corse code: IBFT/PLMT/BAT: 05207
  • 2. Techniques of business data protection • Many companies keep sensitive personal information of customers or employees in their files or on their network. Having a sound security plan in place is to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. • When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information involved. Threats to data may transform over time, but the fundamentals of sound security remain constant.
  • 3. Techniques of business data protection • The federal trade commission has provided a guideline to all businesses on how to protect personal information collected for the business purposes, whereby they outlined that business have to know what personal information's need to be collected and what information have already stored in files and computers, further FTC advices that business have to keep information’s only when they have a business use with and destruct or destroy all information they no longer need, very soon. • Now we are going to discuss what strategies advised by FTC that businesses may adhere with to stay safe from unnecessary legal debts.
  • 4. Techniques of business data protection Start with security This technique requires that, as sensitive information pervades in all most all part of the business or company, business executives have to urge their personnel on securing information available in all part of the business, further, not only available data need to be protected but also in order to start with security, executives have to make sure departments makes reasonable decisions on what information's business need in order to refrain from collecting insignificant information into the business, by factoring this, business will not encounter any legal obligation, therefore starting with security requires that business have to collect information's that are relevant to business, keeping information's that have business uses, and use policies (namely it should be clear on who have legitimate right to access particular business information to avoid compromises). FTC suggests that to start with security business have
  • 5. Don’t collect personal information you don’t need. This tip need that, as business can’t operate without relevant information’s employees have to not collect information’s that are not relevant, namely they have to make sure all information’s given have significant use in the business Hold on to information’s that have a legitimate business need. Sometimes it’s necessary to collect personal data as part of a transaction. But once the deal is done, it may be unwise to keep them, thus the best decision that can be made by savvy company on irrelevant information’s available in the business is to destroy them as soon as they become detected. Don’t use personal information when it’s not necessary. It’s worth that, information’s collected from all sources are kept and used when and where necessary to use them, as the matter of fact, using data where not necessary creates irrelevant risk, whilst it can be prevented.
  • 6. Techniques of business data protection Control access to data sensibly. Once you’ve decided you have a legitimate business need to hold on to sensitive data, take reasonable steps to keep it secure. You’ll want to keep it from the prying eyes of outsiders, of course, but what about your own employees? Not everyone on your staff needs unrestricted access to your network and the information stored on it. Put controls in place to make sure employees have access only on a “need to know” basis. For your network, consider steps such as separate user accounts to limit access to the places where personal data is stored or to control who can use particular databases. For paper files, external drives, disks, etc., an access control could be as simple as a locked file cabinet, When thinking about how to control access to sensitive information in your possession, consider following tips that support this technique.
  • 7. Restrict access to sensitive data. If employees don’t have to use personal information as part of their job, there’s no need for them to have access to it. This tips suggest that employs in your company are not required to be believed all times as they can collude with other person out side organization for their individual benefits, thus its urged that executives have to make sure information’s are only accessible to those who have relevant use to them. Limit administrative access. Administrative access, which allows a user to make system- wide changes to your system, should be limited to the employees tasked to do that job, means that it is non worth all employees to be able to access admin system for
  • 8. Techniques of business data protection Require secure passwords and authentication. By having sensitive personal information stored on your network, strong authentication procedures – including sensible password “hygiene” – can help ensure that only authorized individuals can access the data, thus without strong password and authentication procedure pry individual may access information and use on non legitimate use, through by as the matter of fact company will bear legal consequences on any thing bad happening through used information’s. therefore for a savvy company to avoid this practice from happening has to make sure the following tips are taken into account
  • 9. Insist on complex and unique passwords. “Passwords” like 121212 or QWERTY aren’t much better than no passwords at all. That’s why it’s wise to give some thought to the password standards you implement. Password is very important on data protection however for more security a password should be strong enough that pry can not guess it easily, thus executives must always insist their employees to create and build heavy pins on their files and devices which contains important business data. Store passwords securely. Don’t make it easy for interlopers to access passwords. It’s clear that having password is one step of securing information’s not to be accessible easily but without keeping it properly in a safe and secure place still intended goal wont be reached any more. Thus it is imperative to have a tendency of reminding each time on storing password in a very preferable
  • 10. Techniques of business data protection Guard against brute force attacks. Hackers use automated programs that perform a similar function. These brute force attacks work by typing endless combinations of characters until hackers luck into someone’s password, thus its of great importance to set the number of attempts that one has to try when opening the file or device, by that it can be easy to prevent hackers from continuous trying to open and logging in into your data for his or her illegitimate use of data once obtained. Therefore businesses have to suspend or disable user credentials after a certain number of unsuccessful login attempts. By not adequately restricting the number of tries, the companies placed their networks at risk Protect against authentication bypass. Locking the front door doesn’t offer much protection if the back door is left open.
  • 11. Techniques of business data protection Store sensitive personal information securely and protect it during transmission. Storing sensitive data is a business necessity. And even if you take appropriate steps to secure your network, sometimes you have to send that data elsewhere. Use strong cryptography to secure confidential material during storage and transmission. The method will depend on the types of information your business collects, how you collect it, and how you process it. Given the nature of your business, hence to support this the following ways need to be accountable for success. Keep sensitive information secure throughout its lifecycle. Data doesn’t stay in one place. That’s why it’s important to consider security at all stages, if transmitting information is a necessity for your business.
  • 12. Techniques of business data protection Use industry-tested and accepted methods. When considering what technical standards to follow, keep in mind that experts already may have developed effective standards that can apply to your business. Savvy companies don’t start from scratch when it isn’t necessary. Instead, they take advantage of that collected wisdom. Ensure proper configuration. Encryption – even strong methods – won’t protect your users if you don’t configure it properly. Thus configuration is worthwhile as it can dissimilate you from other individuals design of data protection, it means that if you design your own configuration will prevent interlopers from get information's already pinned from the start.
  • 13. Techniques of business data protection Segment your network and monitor who’s trying to get in and out. When designing your network, consider using tools like firewalls to segment your network, thereby limiting access between computers on your network and between your computers and the internet, by doing so you are likely to be safe somehow, thus it can be easy to detect any one who is accessing data and one who is from accessing them. Hence by having this ability you can eliminate that one you don’t want to have access to your data. Following are ways of giving strength this technique. Segment your network. Not every computer in your system needs to be able to communicate with every other one. You can help protect particularly sensitive data by housing it in a separate secure place on your network if possible.
  • 14. Monitor activity on your network. Who’s that knocking on my door?” That’s what an effective intrusion detection tool asks when it detects unauthorized activity on your network. Thus having ability to detect any one intends to get in your network without permission is of value be course you are able to allow him or not if you wont it be and make him leave the network. Also if let say one got in your network without any notice at early place and leave any changes in your activity by having this intrusion detection tool you will be able to know any changes that made in your activity and correct it immediately.
  • 15. Techniques of business data protection Secure remote access to your network. Business doesn’t just happen in the office only, as a mobile workforce can increase productivity, it also can pose new security challenges on another side. Thus if you give employees, clients, or service providers remote access to your network, you have to taken steps to secure those access points Ensure endpoint security. Just as a chain is only as strong as its weakest link, your network security is only as strong as the weakest security on a computer with remote access to it. Put sensible access limits in place. Not everyone who might occasionally need to get on your network should have an all access, backstage pass. That’s why
  • 16. Techniques of business data protection Apply sound security practices when developing new products. So you have a great new app or innovative software on the drawing board. Early in the development process, think through how customers will likely use the product. If they’ll be storing or sending sensitive information, you have to ask your self that, is your product up to the task of handling that data securely? Train your engineers in secure coding. Have you explained to your developers the need to keep security at the forefront? Follow platform guidelines for security. When it comes to security, there may not be a need to reinvent the wheel. Sometimes the wisest course is to listen to the
  • 17. Techniques of business data protection Verify that privacy and security features work. If your software offers a privacy or security feature, verify that the feature works as advertised. Test for common vulnerabilities. There is no way to anticipate every threat, but some vulnerabilities are commonly known and reasonably foreseeable
  • 18. Techniques of business data protection Make sure your service providers implement reasonable security measures. When it comes to security, keep a watchful eye on your service providers – for example, companies you hire to process personal information collected from customers or to develop apps. Before hiring someone, be candid about your security expectations. Take reasonable steps to select providers able to implement appropriate security measures and monitor that they’re meeting your requirements. Put it in writing. Insist that appropriate security standards are part of your contracts Verify compliance. Security can’t be a “take our word for it” thing. Including
  • 19. Techniques of business data protection Put procedures in place to keep your security current and address vulnerabilities that may arise. • Tips
  • 20. Techniques of business data protection ix) Secure paper, physical media, and devices. Network security is a critical consideration, but many of the same lessons apply to paperwork and physical media like hard drives, laptops, flash drives, and disks. some things to consider when evaluating physical security at your business • Tips • Securely store sensitive files. If it’s necessary to retain important paperwork, take steps to keep it secure. • Protect devices that process personal information. Securing information stored on your network won’t protect your customers if the data has already been stolen through the device that collects it.
  • 21. Techniques of business data protection • Dispose of sensitive data securely. Paperwork or equipment you no longer need may look like trash, but it’s treasure to identity thieves if it includes personal information about consumers or employees