The previous article touched on the need to ensure data security. It mentioned recent internet account breaches that exposed millions of personal information of users and corporate data. These catastrophic events can be combated by means of adopting persistent security strategies to protect data. Read below some of the most important ways to ensure data security.
Correct backup practices
Be it an individual, organization, entrepreneur or even a business group, the right backup system, type and procedure should always be followed, monitored and managed well to avoid data loss. It could be a selective backup of the most important data, full backup, hot backup, remote or local backup and many others. However, if the right systems are not used and managed well, data intended to be secured may be destroyed or possibly lost.
Securing online accounts
Since most backups are made online using e-drive and cloud services, it is always better to secure our online accounts connected to or related to these services. Why the need? If online account security is compromised, data or stored information may get to the hands of the wrong person(s) and the effects as well known will be very catastrophic. How then can online accounts be secured? It all depends on:
- Trying as much as possible to avoid using public computers
- Building stronger passwords
- Trying two-way authentication where applicable
- Never leaving your account logged in when you are away from your PC, not even for a second.
- Avoiding the use of external assistance when using cooperate accounts
- Avoiding the use of browser password saving on both office and public computers.
Safe cloud backups
What about this one? Cloud backup or cloud computer backup, as some may extensively call it, is a system of storing copies of data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is stored in and at the same time accessible from multiple distributed and connected resources that comprise a cluster of related web and computer systems.
Cloud backup solutions are adopted by many enterprises with remote branches distributed across a wide geographical area that need to store a large amount of data to interact between all parties within the cooperate body. This information or data are stored on the internet using a specific storage service provider rather than storing the data locally on a physical disk, such as a hard drive or tape backup. This ensures information is always accessed comfortably and efficiently at different centres over a network at any time needed.
While this is an effective way of storing data, care must be taken as such information can be stolen if a user’s account is accessed by unauthorized persons. Remember: cloud backups for a specific cooperate body is accessed by different users each connected somehow to one (cooperate) account. Hence if just one account is stolen, the entire data (information) of the organization is at risk.
Good offline practices
When in a public place, never discuss sensitive business information in crowded places as you never know who may be listening to the background conversations.
While using the printer, immediately pick all printouts and never leave them unattended for the least passing of time, even those that are discarded should be taken away when leaving the print bay and should be destroyed immediately and disposed of completely.
Also, try as much as possible to avoid remote printing as the printout may get into the hands of the wrong person before you become aware.
When leaving your work desk, even for a second with your computer off sight, always lock your computer screen so that nobody gets access to any onscreen information.
Good online practices
When connecting to public WiFi networks, choose those which are securely encrypted. Never download sensitive personal or business data over public networks, especially those that are not encrypted or even on public computer systems. Still, if circumstances will not prevent you from using public networks and computers, then always clear browser data―cache, cookies, history and downloaded files―from public computers after using or working with them.
When engaged in social media activities, never disclose sensitive personal business information to the public or at least to your online friends.
All too soon, we have come to the end of this article. But wait! What other ways do you think can help secure our data and online accounts? Leave a comment below on that or better still, tell us how this article has helped you!
Leave a Reply