SECURITY

Safeguard Your Work Data

3/7/2013 9:30:28 AM

Steps you need to take to ensure business data is protected all the time

If you’re running a business, you of all people should understand the importance of data security and integrity. It doesn’t matter how small or big a threat may be, or its type or nature, there will be consequences (reputation, legal charges, losing competitive edge, and other unforeseen damages) for any breach of your company’s data and in some instances even irreparable damage. Unless you run a completely offline business, chances are that you have a fair amount of interaction with the web, which is rapidly becoming the top infection point for all sorts of security vulnerabilities. Seeing how security vendors are always releasing not so encouraging reports about the online threat landscape, it is important to understand and acknowledge the fact that unless protected your data is under constant threat.

There are a number of steps that one should take to safeguard and secure data before it’s too late. We share a few basics that shouldn’t be ignored.

Secure your network and connections

While working from home, how do you ensure that you connect securely to your office server for an urgently required file? Virtual Private Networks or VPNs is the answer, think of it as your very own private, completely secure tunnel through the internet. Windows 7 has a built-in VPN feature which you can explore (just Safeguard your work data type “VPN” in the Start Menu field) to hook up two computers. You can also check out pretty good third-party solutions like OpenVPN or Hamachi which are free and easy-to-setup. For your wireless office network, don’t ignore the basics: ensure you deploy WPA2 encryption with a difficult passphrase and MAC address filtering at the router level.

Ensure you deploy WPA2 encryption with a difficult passphrase and MAC address filtering at the router level.

Ensure you deploy WPA2 encryption with a difficult passphrase and MAC address filtering at the router level.

Encryption shouldn’t be ignored at all

Make data encryption part of your work policy, whether you have two or twenty employees. Every computer that has business data on it should be encrypted at the hardware and software level to ensure that even if a laptop is stolen or lost, the data on it is always encrypted and impossible to recover. Tools that let you do this are TrueCrypt, an open source favorite, and Windows’ own BitLocker utility. Both of them are used to securely encrypt entire hard drive volumes with or without hardware encryption via TPM (trusted platform module), deploying different authentication methods.

Online backups are critical

If your office PC hardware is old or aging fast disk drives whirring too loudly, with audible clicking sound – it’s important to back-up your data at short, fixed intervals before disaster strikes. Backing up critical business data online is increasingly becoming a cheaper alternative with a myriad cloud back-up services. While there’s nothing wrong in services such as Dropbox.com and Nortonzone.com, if you just want some cloud to offload your business data on to. But we recommend investing in a dedicated service that offers support and other features.

Check out the likes of SpiderOak (www.spideroak.com) and SOS Online Backup service (www.sosonlinebackup. com) – the former encrypts and never deletes your data, offering a free 2GB service with the ability to backup and sync data across a host of machines including mobile devices, while the latter offers incremental backup and syncing of data from PCs and even attached network drives at an affordable price.

SOS Online Backup

SOS Online Backup

Backup offline as well

Another way to tackle data disasters is to always keep offline data backups to ensure there’s minimal impact on business and quick restoration of data. Of course, online backup solutions are equally important and shouldn’t be ignored, but downloading data from the cloud can take time. Offline data backup policies, whether on a central server, NAS, just another always-on PC or an external drive, can be put in place and configured in a matter of minutes with the following applications.

For Windows machines, Windows Home Server offers the best experience in terms of ease of use and setup it’s got all the basic features as well. Do also consider tools such as Acronis True Image Home or Rsync – the latter being an acclaimed cross-platform backup software.

Offline data  backup policies, whether on a central server, NAS, just another always-on PC  or an external drive, can be put in place  and configured in a matter of minutes with the following applications.

Offline data backup policies, whether on a central server, NAS, just another always-on PC or an external drive, can be put in place and configured in a matter of minutes with the following applications.

Mac users don’t need anything else apart from Time Machine, a free tool already present in OS X which does the job. You can probably supplement it by purchasing a Time Capsule, a cute external drive that backs up data wirelessly through Time Machine.

Mobile shields

While most of us have desktop security software running around the clock, we may ignore mobile security apps or not attach as much importance to them as their desktop counterparts. From now on, don’t. With the advent of BYOD (bring your own device) policy at workplaces, it’s difficult to track where your office data travels smartphones and tablets, we’re looking at you. It’s critical to counter the threat of mobile security.

Apart from trying out mobile apps from popular security vendors, check out Lookout Mobile Security (www. lookout.com) which does a pretty good job of securing your mobile device and the data on it, besides backing it all up in the cloud. The app is in a constant state of vigilance, safeguarding you against malicious app or connecting to an unsecure Wi-Fi hotspot, besides letting you remotely control and manage data on your phone through a Web browser and even find a missing handset.

Other  
 
Top 10
Review : Sigma 24mm f/1.4 DG HSM Art
Review : Canon EF11-24mm f/4L USM
Review : Creative Sound Blaster Roar 2
Review : Philips Fidelio M2L
Review : Alienware 17 - Dell's Alienware laptops
Review Smartwatch : Wellograph
Review : Xiaomi Redmi 2
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8