Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

3 Essential Data Security Tips for CIOs

February 8, 2016 No Comments

Featured blog by Xander Schofield, Independent Technology Writer

Data breaches make headlines, and continue to raise very justified concerns. It’s not just random hackers. Nor should we assume that corporations and high-tech firms are the ones at risk. The majority of data theft affects small businesses. Sensitive data like credit card numbers means relatively greater reward for less risk. Retailers with numerous POS systems transmitting data are especially vulnerable. The increasing use of cell phones as payment devices means another avenue of attack opening up to hackers.

The immediate cost pales in comparison to the loss of reputation. Customers are less likely to do business with a company that can’t protect their private information. Liability could amount to millions of dollars. For a small business this could spell disaster. Management need to recognize that every day cyber security is vital. Every organization needs to make a priority of developing an effective approach to protect data and minimize damage.

While nothing can guarantee immunity, and budgets often don’t leave much room for specialists or constant system updates, there are some practical and relatively cost-effective safeguards that can be put in place.

The Cloud

The latest POS management systems integrate business functions on the cloud, so data is not vulnerable on your business’ servers. Distributed computing is more secure. Any company you use for cloud computing will have its own reputation to worry about. Staying up to date on software and cyber trends is their business, and it’s better to rely on trained professionals who do this on a big scale every day to implement protection than to delegate responsibility to an IT staffer probably less skilled and with other duties to fulfill. As this is a crucial and important investment, do the research and find an affordable service provider that can satisfy all your expectations of data security.

Security Layers

Even if you decide to take it to the cloud, you will have some information on your own computers that needs protecting. Don’t assume out-of-the-box firewall and antivirus programs will suffice. These are the first things a good hacker figures out. While it’s better these things are in place, you can increase security by instituting layers of protection. The more, the better. It sounds like a lot of work, but it’s not. Once in place all you need to do is monitor and update your system periodically. Using tokens and layers of encryption for all communication can greatly reduce risk. Cyber security is big business, and there are always new approaches. Multiple layers employing different and encryption software represent a maze of useless files that leave most cyber-criminals scratching their head, even if they can reach your data.

Network Monitoring

Network engineers should be responsible for performing routine analysis of network traffic and use. They can run tests to identify weaknesses and suspicious usage. Periodic monitoring can also help protect from internal threats, such as unhappy or over-curious employees who can compromise a system from within. Even if it seems overwhelming, this can provide useful data for consultants that tailor the latest fixes, and software and hardware. Expert advice should not be overlooked when developing a long-term security solution. The benefits are more affordable, in that you can usually call in the experts when you have the funds on hand. A negotiated contract for long term help wouldn’t hurt, either.

Though time and budget sometimes are obstacles, there are first-class solutions that are more than worth the investment. Protecting data means protecting your company, your customers, and your future.

 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech