SlideShare uma empresa Scribd logo
1 de 22
Muslim university of
Morogoro
Corse name: Office Management
Corse code: IBFT/PLMT/BAT: 05207
Techniques of business data protection
• Many companies keep sensitive personal information of customers or
employees in their files or on their network. Having a sound security
plan in place is to collect only what you need, keep it safe, and dispose
of it securely can help you meet your legal obligations to protect that
sensitive data.
• When managing your network, developing an app, or even organizing
paper files, sound security is no accident. Companies that consider
security from the start assess their options and make reasonable
choices based on the nature of their business and the sensitivity of the
information involved. Threats to data may transform over time, but the
fundamentals of sound security remain constant.
Techniques of business data protection
• The federal trade commission has provided a guideline to all
businesses on how to protect personal information collected for the
business purposes, whereby they outlined that business have to know
what personal information's need to be collected and what information
have already stored in files and computers, further FTC advices that
business have to keep information’s only when they have a business
use with and destruct or destroy all information they no longer need,
very soon.
• Now we are going to discuss what strategies advised by FTC that
businesses may adhere with to stay safe from unnecessary legal debts.
Techniques of business data protection
Start with security
This technique requires that, as sensitive information pervades
in all most all part of the business or company, business executives
have to urge their personnel on securing information available in all
part of the business, further, not only available data need to be
protected but also in order to start with security, executives have to
make sure departments makes reasonable decisions on what
information's business need in order to refrain from collecting
insignificant information into the business, by factoring this,
business will not encounter any legal obligation, therefore starting
with security requires that business have to collect information's that
are relevant to business, keeping information's that have business
uses, and use policies (namely it should be clear on who have
legitimate right to access particular business information to avoid
compromises). FTC suggests that to start with security business have
Don’t collect personal information you don’t need.
This tip need that, as business can’t operate without relevant
information’s employees have to not collect information’s that
are not relevant, namely they have to make sure all
information’s given have significant use in the business
Hold on to information’s that have a legitimate business need.
Sometimes it’s necessary to collect personal data as part of a
transaction. But once the deal is done, it may be unwise to keep
them, thus the best decision that can be made by savvy company on
irrelevant information’s available in the business is to destroy them
as soon as they become detected.
Don’t use personal information when it’s not necessary.
It’s worth that, information’s collected from all sources are
kept and used when and where necessary to use them, as the
matter of fact, using data where not necessary creates
irrelevant risk, whilst it can be prevented.
Techniques of business data protection
Control access to data sensibly.
Once you’ve decided you have a legitimate business need to
hold on to sensitive data, take reasonable steps to keep it secure.
You’ll want to keep it from the prying eyes of outsiders, of course,
but what about your own employees? Not everyone on your staff
needs unrestricted access to your network and the information
stored on it. Put controls in place to make sure employees have
access only on a “need to know” basis. For your network, consider
steps such as separate user accounts to limit access to the places
where personal data is stored or to control who can use particular
databases. For paper files, external drives, disks, etc., an access
control could be as simple as a locked file cabinet, When thinking
about how to control access to sensitive information in your
possession, consider following tips that support this technique.
Restrict access to sensitive data.
If employees don’t have to use personal information as part
of their job, there’s no need for them to have access to it.
This tips suggest that employs in your company are not
required to be believed all times as they can collude with
other person out side organization for their individual
benefits, thus its urged that executives have to make sure
information’s are only accessible to those who have relevant
use to them.
Limit administrative access.
Administrative access, which allows a user to make system-
wide changes to your system, should be limited to the
employees tasked to do that job, means that it is non worth
all employees to be able to access admin system for
Techniques of business data protection
Require secure passwords and authentication.
By having sensitive personal information stored on your
network, strong authentication procedures – including sensible
password “hygiene” – can help ensure that only authorized
individuals can access the data, thus without strong password and
authentication procedure pry individual may access information and
use on non legitimate use, through by as the matter of fact company
will bear legal consequences on any thing bad happening through
used information’s. therefore for a savvy company to avoid this
practice from happening has to make sure the following tips are
taken into account
Insist on complex and unique passwords.
“Passwords” like 121212 or QWERTY aren’t much better than
no passwords at all. That’s why it’s wise to give some thought
to the password standards you implement. Password is very
important on data protection however for more security a
password should be strong enough that pry can not guess it
easily, thus executives must always insist their employees to
create and build heavy pins on their files and devices which
contains important business data.
Store passwords securely.
Don’t make it easy for interlopers to access passwords. It’s
clear that having password is one step of securing
information’s not to be accessible easily but without keeping it
properly in a safe and secure place still intended goal wont be
reached any more. Thus it is imperative to have a tendency of
reminding each time on storing password in a very preferable
Techniques of business data protection
Guard against brute force attacks.
Hackers use automated programs that perform a similar
function. These brute force attacks work by typing endless
combinations of characters until hackers luck into someone’s
password, thus its of great importance to set the number of
attempts that one has to try when opening the file or device,
by that it can be easy to prevent hackers from continuous
trying to open and logging in into your data for his or her
illegitimate use of data once obtained. Therefore businesses
have to suspend or disable user credentials after a certain
number of unsuccessful login attempts. By not adequately
restricting the number of tries, the companies placed their
networks at risk
Protect against authentication bypass.
Locking the front door doesn’t offer much protection if the
back door is left open.
Techniques of business data protection
Store sensitive personal information securely and protect it
during transmission.
Storing sensitive data is a business necessity. And even if you take
appropriate steps to secure your network, sometimes you have to
send that data elsewhere. Use strong cryptography to secure
confidential material during storage and transmission. The method
will depend on the types of information your business collects, how
you collect it, and how you process it. Given the nature of your
business, hence to support this the following ways need to be
accountable for success.
Keep sensitive information secure throughout its lifecycle.
Data doesn’t stay in one place. That’s why it’s important to
consider security at all stages, if transmitting information is a
necessity for your business.
Techniques of business data protection
Use industry-tested and accepted methods.
When considering what technical standards to follow, keep in mind
that experts already may have developed effective standards
that can apply to your business. Savvy companies don’t start from
scratch when it isn’t necessary. Instead, they take advantage of that
collected wisdom.
Ensure proper configuration.
Encryption – even strong methods – won’t protect your users if
you don’t configure it properly. Thus configuration is
worthwhile as it can dissimilate you from other individuals
design of data protection, it means that if you design your own
configuration will prevent interlopers from get information's
already pinned from the start.
Techniques of business data protection
Segment your network and monitor who’s trying to get in
and out. When designing your network, consider using tools like
firewalls to segment your network, thereby limiting access between
computers on your network and between your computers and the
internet, by doing so you are likely to be safe somehow, thus it can
be easy to detect any one who is accessing data and one who is from
accessing them. Hence by having this ability you can eliminate that
one you don’t want to have access to your data. Following are ways
of giving strength this technique.
Segment your network.
Not every computer in your system needs to be able to
communicate with every other one. You can help protect
particularly sensitive data by housing it in a separate secure
place on your network if possible.
Monitor activity on your network.
Who’s that knocking on my door?” That’s what an effective
intrusion detection tool asks when it detects unauthorized
activity on your network. Thus having ability to detect any one
intends to get in your network without permission is of value be
course you are able to allow him or not if you wont it be and make
him leave the network. Also if let say one got in your network
without any notice at early place and leave any changes in your
activity by having this intrusion detection tool you will be able to
know any changes that made in your activity and correct it
immediately.
Techniques of business data protection
Secure remote access to your network.
Business doesn’t just happen in the office only, as a mobile
workforce can increase productivity, it also can pose new security
challenges on another side. Thus if you give employees, clients, or
service providers remote access to your network, you have to taken
steps to secure those access points
Ensure endpoint security.
Just as a chain is only as strong as its weakest link, your
network security is only as strong as the weakest security on a
computer with remote access to it.
Put sensible access limits in place.
Not everyone who might occasionally need to get on your
network should have an all access, backstage pass. That’s why
Techniques of business data protection
Apply sound security practices when developing new
products.
So you have a great new app or innovative software on the
drawing board. Early in the development process, think through how
customers will likely use the product. If they’ll be storing or sending
sensitive information, you have to ask your self that, is your product
up to the task of handling that data securely?
Train your engineers in secure coding.
Have you explained to your developers the need to keep
security at the forefront?
Follow platform guidelines for security.
When it comes to security, there may not be a need to reinvent
the wheel. Sometimes the wisest course is to listen to the
Techniques of business data protection
Verify that privacy and security features work.
If your software offers a privacy or security feature, verify that
the feature works as advertised.
Test for common vulnerabilities.
There is no way to anticipate every threat, but some
vulnerabilities are commonly known and reasonably
foreseeable
Techniques of business data protection
Make sure your service providers implement reasonable
security measures.
When it comes to security, keep a watchful eye on your service
providers – for example, companies you hire to process personal
information collected from customers or to develop apps. Before
hiring someone, be candid about your security expectations. Take
reasonable steps to select providers able to implement appropriate
security measures and monitor that they’re meeting your
requirements.
Put it in writing. Insist that appropriate security standards are
part of your contracts
Verify compliance.
Security can’t be a “take our word for it” thing. Including
Techniques of business data protection
Put procedures in place to keep your security current and address
vulnerabilities that may arise.
• Tips
Techniques of business data protection
ix) Secure paper, physical media, and devices. Network security is a
critical consideration, but many of the same lessons apply to paperwork
and physical media like hard drives, laptops, flash drives, and disks.
some things to consider when evaluating physical security at your
business
• Tips
• Securely store sensitive files. If it’s necessary to retain
important paperwork, take steps to keep it secure.
• Protect devices that process personal information. Securing
information stored on your network won’t protect your
customers if the data has already been stolen through the device
that collects it.
Techniques of business data protection
• Dispose of sensitive data securely. Paperwork or equipment
you no longer need may look like trash, but it’s treasure to
identity thieves if it includes personal information about
consumers or employees
•
• THANK YOU

Mais conteúdo relacionado

Semelhante a TECHNIQUES DATA PRO.pptx

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 
Digital Trust in the Work Place
Digital Trust in the Work PlaceDigital Trust in the Work Place
Digital Trust in the Work PlaceBahaa Al Zubaidi
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxrtodd599
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber SecurityThrottleNet, Inc
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Enterprise Wired
 

Semelhante a TECHNIQUES DATA PRO.pptx (20)

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
Digital Trust in the Work Place
Digital Trust in the Work PlaceDigital Trust in the Work Place
Digital Trust in the Work Place
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
Protecting Business Data and Information: 3 Key Factors to Know | Enterprise ...
 

Mais de HAFIDHISAIDI1

CAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposesCAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposesHAFIDHISAIDI1
 
Cost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision makingCost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision makingHAFIDHISAIDI1
 
Lecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.pptLecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.pptHAFIDHISAIDI1
 
Lecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.pptLecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.pptHAFIDHISAIDI1
 

Mais de HAFIDHISAIDI1 (9)

CAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposesCAPITAL BUDGETING. for the business purposes
CAPITAL BUDGETING. for the business purposes
 
Cost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision makingCost, volume, profit Analysis. for decision making
Cost, volume, profit Analysis. for decision making
 
Lecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.pptLecture 3 Introduction to Financial Statements.ppt
Lecture 3 Introduction to Financial Statements.ppt
 
Lecture 3.ppt
Lecture 3.pptLecture 3.ppt
Lecture 3.ppt
 
Lecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.pptLecture 2 - Double Taxation.ppt
Lecture 2 - Double Taxation.ppt
 
13247355.ppt
13247355.ppt13247355.ppt
13247355.ppt
 
lecture three.pptx
lecture three.pptxlecture three.pptx
lecture three.pptx
 
Lecture one.pptx
Lecture one.pptxLecture one.pptx
Lecture one.pptx
 
lecture two.pptx
lecture two.pptxlecture two.pptx
lecture two.pptx
 

Último

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Último (20)

7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

TECHNIQUES DATA PRO.pptx

  • 1. Muslim university of Morogoro Corse name: Office Management Corse code: IBFT/PLMT/BAT: 05207
  • 2. Techniques of business data protection • Many companies keep sensitive personal information of customers or employees in their files or on their network. Having a sound security plan in place is to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. • When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information involved. Threats to data may transform over time, but the fundamentals of sound security remain constant.
  • 3. Techniques of business data protection • The federal trade commission has provided a guideline to all businesses on how to protect personal information collected for the business purposes, whereby they outlined that business have to know what personal information's need to be collected and what information have already stored in files and computers, further FTC advices that business have to keep information’s only when they have a business use with and destruct or destroy all information they no longer need, very soon. • Now we are going to discuss what strategies advised by FTC that businesses may adhere with to stay safe from unnecessary legal debts.
  • 4. Techniques of business data protection Start with security This technique requires that, as sensitive information pervades in all most all part of the business or company, business executives have to urge their personnel on securing information available in all part of the business, further, not only available data need to be protected but also in order to start with security, executives have to make sure departments makes reasonable decisions on what information's business need in order to refrain from collecting insignificant information into the business, by factoring this, business will not encounter any legal obligation, therefore starting with security requires that business have to collect information's that are relevant to business, keeping information's that have business uses, and use policies (namely it should be clear on who have legitimate right to access particular business information to avoid compromises). FTC suggests that to start with security business have
  • 5. Don’t collect personal information you don’t need. This tip need that, as business can’t operate without relevant information’s employees have to not collect information’s that are not relevant, namely they have to make sure all information’s given have significant use in the business Hold on to information’s that have a legitimate business need. Sometimes it’s necessary to collect personal data as part of a transaction. But once the deal is done, it may be unwise to keep them, thus the best decision that can be made by savvy company on irrelevant information’s available in the business is to destroy them as soon as they become detected. Don’t use personal information when it’s not necessary. It’s worth that, information’s collected from all sources are kept and used when and where necessary to use them, as the matter of fact, using data where not necessary creates irrelevant risk, whilst it can be prevented.
  • 6. Techniques of business data protection Control access to data sensibly. Once you’ve decided you have a legitimate business need to hold on to sensitive data, take reasonable steps to keep it secure. You’ll want to keep it from the prying eyes of outsiders, of course, but what about your own employees? Not everyone on your staff needs unrestricted access to your network and the information stored on it. Put controls in place to make sure employees have access only on a “need to know” basis. For your network, consider steps such as separate user accounts to limit access to the places where personal data is stored or to control who can use particular databases. For paper files, external drives, disks, etc., an access control could be as simple as a locked file cabinet, When thinking about how to control access to sensitive information in your possession, consider following tips that support this technique.
  • 7. Restrict access to sensitive data. If employees don’t have to use personal information as part of their job, there’s no need for them to have access to it. This tips suggest that employs in your company are not required to be believed all times as they can collude with other person out side organization for their individual benefits, thus its urged that executives have to make sure information’s are only accessible to those who have relevant use to them. Limit administrative access. Administrative access, which allows a user to make system- wide changes to your system, should be limited to the employees tasked to do that job, means that it is non worth all employees to be able to access admin system for
  • 8. Techniques of business data protection Require secure passwords and authentication. By having sensitive personal information stored on your network, strong authentication procedures – including sensible password “hygiene” – can help ensure that only authorized individuals can access the data, thus without strong password and authentication procedure pry individual may access information and use on non legitimate use, through by as the matter of fact company will bear legal consequences on any thing bad happening through used information’s. therefore for a savvy company to avoid this practice from happening has to make sure the following tips are taken into account
  • 9. Insist on complex and unique passwords. “Passwords” like 121212 or QWERTY aren’t much better than no passwords at all. That’s why it’s wise to give some thought to the password standards you implement. Password is very important on data protection however for more security a password should be strong enough that pry can not guess it easily, thus executives must always insist their employees to create and build heavy pins on their files and devices which contains important business data. Store passwords securely. Don’t make it easy for interlopers to access passwords. It’s clear that having password is one step of securing information’s not to be accessible easily but without keeping it properly in a safe and secure place still intended goal wont be reached any more. Thus it is imperative to have a tendency of reminding each time on storing password in a very preferable
  • 10. Techniques of business data protection Guard against brute force attacks. Hackers use automated programs that perform a similar function. These brute force attacks work by typing endless combinations of characters until hackers luck into someone’s password, thus its of great importance to set the number of attempts that one has to try when opening the file or device, by that it can be easy to prevent hackers from continuous trying to open and logging in into your data for his or her illegitimate use of data once obtained. Therefore businesses have to suspend or disable user credentials after a certain number of unsuccessful login attempts. By not adequately restricting the number of tries, the companies placed their networks at risk Protect against authentication bypass. Locking the front door doesn’t offer much protection if the back door is left open.
  • 11. Techniques of business data protection Store sensitive personal information securely and protect it during transmission. Storing sensitive data is a business necessity. And even if you take appropriate steps to secure your network, sometimes you have to send that data elsewhere. Use strong cryptography to secure confidential material during storage and transmission. The method will depend on the types of information your business collects, how you collect it, and how you process it. Given the nature of your business, hence to support this the following ways need to be accountable for success. Keep sensitive information secure throughout its lifecycle. Data doesn’t stay in one place. That’s why it’s important to consider security at all stages, if transmitting information is a necessity for your business.
  • 12. Techniques of business data protection Use industry-tested and accepted methods. When considering what technical standards to follow, keep in mind that experts already may have developed effective standards that can apply to your business. Savvy companies don’t start from scratch when it isn’t necessary. Instead, they take advantage of that collected wisdom. Ensure proper configuration. Encryption – even strong methods – won’t protect your users if you don’t configure it properly. Thus configuration is worthwhile as it can dissimilate you from other individuals design of data protection, it means that if you design your own configuration will prevent interlopers from get information's already pinned from the start.
  • 13. Techniques of business data protection Segment your network and monitor who’s trying to get in and out. When designing your network, consider using tools like firewalls to segment your network, thereby limiting access between computers on your network and between your computers and the internet, by doing so you are likely to be safe somehow, thus it can be easy to detect any one who is accessing data and one who is from accessing them. Hence by having this ability you can eliminate that one you don’t want to have access to your data. Following are ways of giving strength this technique. Segment your network. Not every computer in your system needs to be able to communicate with every other one. You can help protect particularly sensitive data by housing it in a separate secure place on your network if possible.
  • 14. Monitor activity on your network. Who’s that knocking on my door?” That’s what an effective intrusion detection tool asks when it detects unauthorized activity on your network. Thus having ability to detect any one intends to get in your network without permission is of value be course you are able to allow him or not if you wont it be and make him leave the network. Also if let say one got in your network without any notice at early place and leave any changes in your activity by having this intrusion detection tool you will be able to know any changes that made in your activity and correct it immediately.
  • 15. Techniques of business data protection Secure remote access to your network. Business doesn’t just happen in the office only, as a mobile workforce can increase productivity, it also can pose new security challenges on another side. Thus if you give employees, clients, or service providers remote access to your network, you have to taken steps to secure those access points Ensure endpoint security. Just as a chain is only as strong as its weakest link, your network security is only as strong as the weakest security on a computer with remote access to it. Put sensible access limits in place. Not everyone who might occasionally need to get on your network should have an all access, backstage pass. That’s why
  • 16. Techniques of business data protection Apply sound security practices when developing new products. So you have a great new app or innovative software on the drawing board. Early in the development process, think through how customers will likely use the product. If they’ll be storing or sending sensitive information, you have to ask your self that, is your product up to the task of handling that data securely? Train your engineers in secure coding. Have you explained to your developers the need to keep security at the forefront? Follow platform guidelines for security. When it comes to security, there may not be a need to reinvent the wheel. Sometimes the wisest course is to listen to the
  • 17. Techniques of business data protection Verify that privacy and security features work. If your software offers a privacy or security feature, verify that the feature works as advertised. Test for common vulnerabilities. There is no way to anticipate every threat, but some vulnerabilities are commonly known and reasonably foreseeable
  • 18. Techniques of business data protection Make sure your service providers implement reasonable security measures. When it comes to security, keep a watchful eye on your service providers – for example, companies you hire to process personal information collected from customers or to develop apps. Before hiring someone, be candid about your security expectations. Take reasonable steps to select providers able to implement appropriate security measures and monitor that they’re meeting your requirements. Put it in writing. Insist that appropriate security standards are part of your contracts Verify compliance. Security can’t be a “take our word for it” thing. Including
  • 19. Techniques of business data protection Put procedures in place to keep your security current and address vulnerabilities that may arise. • Tips
  • 20. Techniques of business data protection ix) Secure paper, physical media, and devices. Network security is a critical consideration, but many of the same lessons apply to paperwork and physical media like hard drives, laptops, flash drives, and disks. some things to consider when evaluating physical security at your business • Tips • Securely store sensitive files. If it’s necessary to retain important paperwork, take steps to keep it secure. • Protect devices that process personal information. Securing information stored on your network won’t protect your customers if the data has already been stolen through the device that collects it.
  • 21. Techniques of business data protection • Dispose of sensitive data securely. Paperwork or equipment you no longer need may look like trash, but it’s treasure to identity thieves if it includes personal information about consumers or employees