4 easy tips for to ensure data protection

Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation's data.
Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation’s data.


Ransomware attacks have skyrocketed during the pandemic, by nearly 500%. The REvil gang took advantage of the 4th July holiday weekend to stage the US$70mn Kaseya ransomware attack, while the SolarWinds breach took place just before Christmas. It’s clear that cybercriminals do not take a day off. Year-round protection of your data is vital to safeguard it so that if an attack does occur, your company can continue to operate as usual.


Below are four essential tips for safeguarding your organisation’s most valuable asset: its data.

1. There is no excuse not to back up your data


a. It goes without saying that data backups are crucial. An external hard drive to store backup copies is simply not enough.


b. An effective data protection strategy involves storing at least one previous version for a specific retention period (a minimum of 30 days) in a read-only repository that is in a different location to the original. This is the absolute minimum.

2. End-to-end data security is key


a. End-to-end security is, of course, a must for protecting files against ransomware and other cyber threats. Having data security end-to-end implies encrypting data at the edge (where it is created), in transit (over the network), and in the cloud (where it is stored) in cloud-driven distributed setups.


b. Global file system technology can safeguard your data before it leaves your devices, workplaces, and servers by leveraging source-based encryption at rest and in transit. Furthermore, your data cannot be read even if it is temporarily locked due to an assault.

3. Consider who is viewing your files remotely


a. Remote access to an organisation’s files brings a significant number of benefits. However, if the wrong people are authorised to view specific files, this could lead to security issues. To mitigate this, ensure that your remote access system, whether VDIs, global file systems or others, meets corporate security policies and provides consistent access control from any personnel user device or location.

READ MORE:

4. Make sure that passwords are updated regularly (and are secure)


a. Employees relying on weak passwords are more likely to be susceptible to successful cyberattacks. When resetting a password, make sure it is a combination of letters, numbers, and symbols.

b. Keeping passwords safe on a multi-factor authentication password manager and updating them regularly is a simple and effective way to prevent passwords, and your data, getting into the wrong hands.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

IoT Security: Protecting Your Connected Devices from Cyber Attacks

Miro Khach • 19th June 2024

Did you know we’re heading towards having more than 25 billion IoT devices by 2030? This jump means we have to really focus on keeping our smart devices safe. We’re looking at everything from threats to our connected home gadgets to needing strong encryption methods. Ensuring we have secure ways to talk to these devices...

Future Proofing Shipping Against the Next Crisis

Captain Steve Bomgardner • 18th June 2024

Irrespective of whether the next crisis for ship owners is war, weather or another global health event, one fact is ineluctable: recruiting onboard crew is becoming difficult. With limited shore time and contracts that become ever longer, morale is a big issue on board. The job can be both mundane and high risk. Every day...

London Tech Week 2024: A Launched Recap

Dianne Castillo • 17th June 2024

Dominating global tech investment, London Tech Week 2024 was buzzing with innovation. Our team joined the action, interviewing founders and soaking up the latest tech trends. Discover key takeaways and meet some of the exciting startups we met!

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...