SlideShare uma empresa Scribd logo
1 de 7
LOGO




       SafeSpaceOnline



        7 Critical Steps
        To Protect Your
        Data
LOGO


 To minimize the significant risks arising from data
  loss, every company should take specific
  preventative measures to protect their critical
  business data. These measures fall into two broad
  categories: physical security and digital security.
  We will identify seven critical steps to ensure your
  data is secure, then look at the additional
  protection required to keep your data available.

  Here, we look at physical security and the three
  key steps a company should take to ensure their
  data is protected against environmental changes
  and physical theft.




                                                SafeSpaceOnline
LOGO


 Step #1: Secure Access
  Protect critical computer equipment against
  physical theft by placing it in a separate physical
  space which has controlled, recorded access. Limit
  entrance to only authorized personnel.

  Step #2: Environmental Controls
  The space which houses critical computer
  equipment should be climate controlled through
  proper heating and air conditioning, including fail-
  over systems in the event of main system failure.
  Fire suppression and temperature monitoring with
  an automatic notification system should be
  implemented.



                                                 SafeSpaceOnline
LOGO


    Step #3: Uninterrupted Power
    Ensure that backup power supplies, including surge
    suppression, are in place to provide power to key
    computer equipment in the event of a primary power
    failure or instability in the primary power supply.
    Now, we examine digital security and the four key steps
    a company should take to ensure their data is protected
    against unauthorized access.

    Step #4: Firewalls
    A firewall should be placed between the companys
    internal computer network and each external network
    access point to stop unauthorized users from gaining
    access to the internal network and company data.




                                                      SafeSpaceOnline
LOGO

Step #5: Anti-Virus Software
Each workstation and server in the company should
have anti-virus software installed and periodically
updated with current virus definition files. Email servers
should scan for viruses embedded in external messages
and attachments prior to relaying them to internal email
boxes.

Step #6: Restrict User Access
Access to network resources, applications and data files
should be restricted exclusively to those employees
with a need to access. Be sure to review user access
rights regularly to reflect changes in employee
responsibilities and when an employee leaves the
company, his or her login ID and access rights should be
immediately removed. In some cases, current
employees known to be leaving the company may also
need to have their access rights restricted to ensure the
safety and confidentiality of company data.

                                                     SafeSpaceOnline
LOGO
 Step #7: Passwords
  Ensure all passwords granting access to the company's
  computer network, databases and critical files are properly
  enforced. Passwords should be at least 8 characters in length
  and combine letters and numbers. Users should change their
  passwords at least every 90 days. Network administrator
  passwords should be changed every 30 days.

  Protection Beyond Security
  The 7 steps outlined above are critical as the first line of
  defense in protecting your data. However, it is important to be
  aware that data loss can still occur. Beyond data loss caused by
  disasters and criminal activity, data can be lost for a variety of
  more mundane reasons. These include application corruption,
  hardware failure, accidental deletion and user error. In any of
  these circumstances, you will need to roll back to a clean,
  available copy of your data. Continuous, online backup to a
  secure remote site provides archived and up-to-the-loss copies
  of data that can be quickly and conveniently recovered. With
  this added protection, your data is not just secure, but
  available and supporting your business.



                                                             SafeSpaceOnline
LOGO




          Read more at SafeSpaceOnline.com




       Click to edit company slogan .

Mais conteúdo relacionado

Mais procurados

Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
Jerod Brennen
 

Mais procurados (20)

ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?How Computer Network Support System Work Against Hacking?
How Computer Network Support System Work Against Hacking?
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Topic11
Topic11Topic11
Topic11
 
IT Security
IT SecurityIT Security
IT Security
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Information security policy
Information security policyInformation security policy
Information security policy
 
ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6ISO 270001 Management Clause - 6
ISO 270001 Management Clause - 6
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 

Semelhante a 7 critical steps to protect your data

En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor
 

Semelhante a 7 critical steps to protect your data (20)

How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

7 critical steps to protect your data

  • 1. LOGO SafeSpaceOnline 7 Critical Steps To Protect Your Data
  • 2. LOGO  To minimize the significant risks arising from data loss, every company should take specific preventative measures to protect their critical business data. These measures fall into two broad categories: physical security and digital security. We will identify seven critical steps to ensure your data is secure, then look at the additional protection required to keep your data available. Here, we look at physical security and the three key steps a company should take to ensure their data is protected against environmental changes and physical theft. SafeSpaceOnline
  • 3. LOGO  Step #1: Secure Access Protect critical computer equipment against physical theft by placing it in a separate physical space which has controlled, recorded access. Limit entrance to only authorized personnel. Step #2: Environmental Controls The space which houses critical computer equipment should be climate controlled through proper heating and air conditioning, including fail- over systems in the event of main system failure. Fire suppression and temperature monitoring with an automatic notification system should be implemented. SafeSpaceOnline
  • 4. LOGO  Step #3: Uninterrupted Power Ensure that backup power supplies, including surge suppression, are in place to provide power to key computer equipment in the event of a primary power failure or instability in the primary power supply. Now, we examine digital security and the four key steps a company should take to ensure their data is protected against unauthorized access. Step #4: Firewalls A firewall should be placed between the companys internal computer network and each external network access point to stop unauthorized users from gaining access to the internal network and company data. SafeSpaceOnline
  • 5. LOGO Step #5: Anti-Virus Software Each workstation and server in the company should have anti-virus software installed and periodically updated with current virus definition files. Email servers should scan for viruses embedded in external messages and attachments prior to relaying them to internal email boxes. Step #6: Restrict User Access Access to network resources, applications and data files should be restricted exclusively to those employees with a need to access. Be sure to review user access rights regularly to reflect changes in employee responsibilities and when an employee leaves the company, his or her login ID and access rights should be immediately removed. In some cases, current employees known to be leaving the company may also need to have their access rights restricted to ensure the safety and confidentiality of company data. SafeSpaceOnline
  • 6. LOGO  Step #7: Passwords Ensure all passwords granting access to the company's computer network, databases and critical files are properly enforced. Passwords should be at least 8 characters in length and combine letters and numbers. Users should change their passwords at least every 90 days. Network administrator passwords should be changed every 30 days. Protection Beyond Security The 7 steps outlined above are critical as the first line of defense in protecting your data. However, it is important to be aware that data loss can still occur. Beyond data loss caused by disasters and criminal activity, data can be lost for a variety of more mundane reasons. These include application corruption, hardware failure, accidental deletion and user error. In any of these circumstances, you will need to roll back to a clean, available copy of your data. Continuous, online backup to a secure remote site provides archived and up-to-the-loss copies of data that can be quickly and conveniently recovered. With this added protection, your data is not just secure, but available and supporting your business. SafeSpaceOnline
  • 7. LOGO Read more at SafeSpaceOnline.com Click to edit company slogan .