4 easy tips for to ensure data protection

Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation's data.
Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation’s data.


Ransomware attacks have skyrocketed during the pandemic, by nearly 500%. The REvil gang took advantage of the 4th July holiday weekend to stage the US$70mn Kaseya ransomware attack, while the SolarWinds breach took place just before Christmas. It’s clear that cybercriminals do not take a day off. Year-round protection of your data is vital to safeguard it so that if an attack does occur, your company can continue to operate as usual.


Below are four essential tips for safeguarding your organisation’s most valuable asset: its data.

1. There is no excuse not to back up your data


a. It goes without saying that data backups are crucial. An external hard drive to store backup copies is simply not enough.


b. An effective data protection strategy involves storing at least one previous version for a specific retention period (a minimum of 30 days) in a read-only repository that is in a different location to the original. This is the absolute minimum.

2. End-to-end data security is key


a. End-to-end security is, of course, a must for protecting files against ransomware and other cyber threats. Having data security end-to-end implies encrypting data at the edge (where it is created), in transit (over the network), and in the cloud (where it is stored) in cloud-driven distributed setups.


b. Global file system technology can safeguard your data before it leaves your devices, workplaces, and servers by leveraging source-based encryption at rest and in transit. Furthermore, your data cannot be read even if it is temporarily locked due to an assault.

3. Consider who is viewing your files remotely


a. Remote access to an organisation’s files brings a significant number of benefits. However, if the wrong people are authorised to view specific files, this could lead to security issues. To mitigate this, ensure that your remote access system, whether VDIs, global file systems or others, meets corporate security policies and provides consistent access control from any personnel user device or location.

READ MORE:

4. Make sure that passwords are updated regularly (and are secure)


a. Employees relying on weak passwords are more likely to be susceptible to successful cyberattacks. When resetting a password, make sure it is a combination of letters, numbers, and symbols.

b. Keeping passwords safe on a multi-factor authentication password manager and updating them regularly is a simple and effective way to prevent passwords, and your data, getting into the wrong hands.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Why ABM is Key to Strengthening your Marketing Strategy

Erin Lanahan • 16th May 2024

Account-Based Marketing (ABM) is revolutionizing B2B marketing by targeting high-value accounts with personalized strategies. Unlike traditional methods, ABM focuses on specific companies, delivering tailored content that meets their unique needs. This approach not only boosts ROI but also strengthens customer relationships and drives long-term growth. By aligning marketing and sales efforts, ABM ensures a unified...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

Overcoming the Obstacles to AI Adoption

Kit Cox • 02nd May 2024

The power of AI combined with suitable use cases and a robust implementation plan can help businesses to radically reduce the time spent on manual, repetitive tasks, and allow teams to prioritise value-added work. But in all the excitement, it’s evident that many businesses are held back by inertia, and a lack of understanding about...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...