SlideShare a Scribd company logo
1 of 8
Data Security
And Preventing Data Loss
Backup Files
• Disasters happen unexpectedly and can essentially happen to anyone all around the
world. Backing up all your data is essential to the recovery of that data in the event a
disaster does occur.
• Multiple backups in multiple locations should be a practice every organization or
individual uses to ensure data can be restored in even the worst scenarios.
• Create a plan that allows you to constantly verify the status of backups to prevent
corrupted data. This is an extra precaution that should be taken to ensure that
backups are available for use when needed and contain uncorrupted data when
accessed.
Antivirus Software
• Protecting your data from malicious groups
• Some features in antivirus software’s include
intrusion detection systems, Fire-walls, anti-
malware systems, signature-based threat
detection.
• Viruses and malware have many forms which
can steal your sensitive data and expose other
vulnerabilities within your organization.
• Choosing an antivirus that is created to
handle the security requirements and size of
your organization is essential in ensuring
your security against malicious attackers.
Protecting Hardware
• Keeping your computer hardware in a clean, dry, and dust free location to ensure the
longevity of the hardware.
• Avoid eating food or drinking beverages near your important hardware to limit the
risk of damaging your hardware. Large organizations should have a standard set-in
place for employee cleanliness when in workspaces to avoid unnecessary damages.
• Protect your sensitive hardware with biometric protection or via CCTV cameras.
• Organizations should consider purchasing computer/hardware insurance because
computer hardware is a substantial capital investment which can lead a business to
failure if destroyed.
Strong Passwords/keys
• Every organization and individual should practice an existing password policy or
create their own.
• Passwords are an essential part to controlling access to data and in many cases can
end up being the weakest-link when it comes to data protection.
• Multi-factor authentication should be adopted to all organizations as it adds an extra
layer of security, ensuring that only someone qualified to access such data does.
• Passwords should include special characters, exceed 10 characters(The more
characters the better), and mix both lower and uppercase characters.
VPN
• Data Privacy
• A VPN (Virtual private network) allows you to further secure your data by limiting
readable data to authorized individuals only.
• Establishes encrypted connections between your organization's devices.
• Masks your IP address from potential hackers, protecting your identity.
• VPN should be considered by organizations that need to constantly make multiple
connections between different devices and networks.
Encryption
• Encryption can improve the integrity
of important data including but not
limited too corporate information.
• Organizations should use encryption
tools that follow AES(Advanced
Encryption Standard).
• Data loss can be prevented by storing
and transmitting data that is
encrypted, rather than normal text.
• Access to important unencrypted data
should be limited to only certain
positions within an organization that
need to access the data.
Conclusion
There are many ways an organization/individual can increase the security of
data. It is important that every organization has a plan for the worst-case
scenario, so that operations can continue smoothly and efficiently no matter the
circumstance.
All organizations/individuals should put in the effort to increase their data
security as it will decrease the likelihood of data loss and data theft.

More Related Content

Similar to Week 5 Security Training Assignment.pptx

Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture DCMDLearning
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?VRS Technologies
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptxa95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptxDeepakKumarKashyap9
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 

Similar to Week 5 Security Training Assignment.pptx (20)

Mis
MisMis
Mis
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture D
 
Data security
Data securityData security
Data security
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?What Are the Steps to Protect Business From Cyber Attacks?
What Are the Steps to Protect Business From Cyber Attacks?
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Mis
MisMis
Mis
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptxa95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
a95c71a7e997e3c9adfrtreeweewerdfrtfd.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Information security
Information securityInformation security
Information security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 

Recently uploaded

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

Week 5 Security Training Assignment.pptx

  • 2. Backup Files • Disasters happen unexpectedly and can essentially happen to anyone all around the world. Backing up all your data is essential to the recovery of that data in the event a disaster does occur. • Multiple backups in multiple locations should be a practice every organization or individual uses to ensure data can be restored in even the worst scenarios. • Create a plan that allows you to constantly verify the status of backups to prevent corrupted data. This is an extra precaution that should be taken to ensure that backups are available for use when needed and contain uncorrupted data when accessed.
  • 3. Antivirus Software • Protecting your data from malicious groups • Some features in antivirus software’s include intrusion detection systems, Fire-walls, anti- malware systems, signature-based threat detection. • Viruses and malware have many forms which can steal your sensitive data and expose other vulnerabilities within your organization. • Choosing an antivirus that is created to handle the security requirements and size of your organization is essential in ensuring your security against malicious attackers.
  • 4. Protecting Hardware • Keeping your computer hardware in a clean, dry, and dust free location to ensure the longevity of the hardware. • Avoid eating food or drinking beverages near your important hardware to limit the risk of damaging your hardware. Large organizations should have a standard set-in place for employee cleanliness when in workspaces to avoid unnecessary damages. • Protect your sensitive hardware with biometric protection or via CCTV cameras. • Organizations should consider purchasing computer/hardware insurance because computer hardware is a substantial capital investment which can lead a business to failure if destroyed.
  • 5. Strong Passwords/keys • Every organization and individual should practice an existing password policy or create their own. • Passwords are an essential part to controlling access to data and in many cases can end up being the weakest-link when it comes to data protection. • Multi-factor authentication should be adopted to all organizations as it adds an extra layer of security, ensuring that only someone qualified to access such data does. • Passwords should include special characters, exceed 10 characters(The more characters the better), and mix both lower and uppercase characters.
  • 6. VPN • Data Privacy • A VPN (Virtual private network) allows you to further secure your data by limiting readable data to authorized individuals only. • Establishes encrypted connections between your organization's devices. • Masks your IP address from potential hackers, protecting your identity. • VPN should be considered by organizations that need to constantly make multiple connections between different devices and networks.
  • 7. Encryption • Encryption can improve the integrity of important data including but not limited too corporate information. • Organizations should use encryption tools that follow AES(Advanced Encryption Standard). • Data loss can be prevented by storing and transmitting data that is encrypted, rather than normal text. • Access to important unencrypted data should be limited to only certain positions within an organization that need to access the data.
  • 8. Conclusion There are many ways an organization/individual can increase the security of data. It is important that every organization has a plan for the worst-case scenario, so that operations can continue smoothly and efficiently no matter the circumstance. All organizations/individuals should put in the effort to increase their data security as it will decrease the likelihood of data loss and data theft.