Goodbye job applications, hello dream career
Seize control of your career and design the future you deserve with LW career

Practical tips to secure and manage your data

user iconLawyers Weekly 19 November 2008 NewLaw

Invest in intelligent archiving: Look at software-based archiving solutions that let you store and manage data originating from email and file servers, content management systems and even…

Invest in intelligent archiving:

Look at software-based archiving solutions that let you store and manage data originating from email and file servers, content management systems and even instant messaging clients. These products use data classification engines to help companies manage, retain and protect their information.

Stay up to date with THE latest threats:

Employers and employees need to have some awareness of new and existing security threats. Providing security-related training for your staff can also help prevent your organisation being vulnerable to attacks.

Secure mobile devices:

Like your PCs, mobile devices such as a smartphones and PDAs need to run the latest security software. Always develop security policies that address the requirement and use encryption software to secure these devices.

Be aware of social networking:

Most people participate in some form of social networking through popular websites. Create internet security policies that address this. Block access if required because hackers will carry out attacks using personal information from these sites.

Don’t always accept third-party applications:

Hackers often implant viruses, malware and other types of malicious code into applications. This code can provide the attackers with access to user profiles.

Practice a defence-in-depth strategy:

Organisations need to adopt a defence-in-depth strategy which emphasises multiple, overlapping, and mutually supportive systems to protect against single-point failures in any specific technology or protection method. This should include the deployment of regularly updated antivirus, firewalls, intrusion detection and intrusion protection systems on client systems. In addition, organisations should establish a back-up and recovery plan so they are not interrupted in the event of a disaster, and to protect the organisation against present and future online threats.

You need to be a member to post comments. Become a member for free today!