4 easy tips for to ensure data protection

Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation's data.
Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation’s data.


Ransomware attacks have skyrocketed during the pandemic, by nearly 500%. The REvil gang took advantage of the 4th July holiday weekend to stage the US$70mn Kaseya ransomware attack, while the SolarWinds breach took place just before Christmas. It’s clear that cybercriminals do not take a day off. Year-round protection of your data is vital to safeguard it so that if an attack does occur, your company can continue to operate as usual.


Below are four essential tips for safeguarding your organisation’s most valuable asset: its data.

1. There is no excuse not to back up your data


a. It goes without saying that data backups are crucial. An external hard drive to store backup copies is simply not enough.


b. An effective data protection strategy involves storing at least one previous version for a specific retention period (a minimum of 30 days) in a read-only repository that is in a different location to the original. This is the absolute minimum.

2. End-to-end data security is key


a. End-to-end security is, of course, a must for protecting files against ransomware and other cyber threats. Having data security end-to-end implies encrypting data at the edge (where it is created), in transit (over the network), and in the cloud (where it is stored) in cloud-driven distributed setups.


b. Global file system technology can safeguard your data before it leaves your devices, workplaces, and servers by leveraging source-based encryption at rest and in transit. Furthermore, your data cannot be read even if it is temporarily locked due to an assault.

3. Consider who is viewing your files remotely


a. Remote access to an organisation’s files brings a significant number of benefits. However, if the wrong people are authorised to view specific files, this could lead to security issues. To mitigate this, ensure that your remote access system, whether VDIs, global file systems or others, meets corporate security policies and provides consistent access control from any personnel user device or location.

READ MORE:

4. Make sure that passwords are updated regularly (and are secure)


a. Employees relying on weak passwords are more likely to be susceptible to successful cyberattacks. When resetting a password, make sure it is a combination of letters, numbers, and symbols.

b. Keeping passwords safe on a multi-factor authentication password manager and updating them regularly is a simple and effective way to prevent passwords, and your data, getting into the wrong hands.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Tech and Business Outlook: US Confident, European Sentiment Mixed

Viva Technology • 11th February 2025

The VivaTech Confidence Barometer, now in its second edition, reveals strong confidence among tech executives regarding the impact of emerging technologies on business competitiveness, particularly AI, which is expected to have the most significant impact in the near future. Surveying tech leaders from Europe and North America, 81% recognize their companies as competitive internationally, with...

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.