How to protect your data from being breached?

Data security isn’t a new topic, but it is rarely something you pay attention to. With all our busy lives, we often forget about protecting our information, but it should be the most important task you should take seriously every day. Read more about how to protect yourself.

In this era of data mining and technological warfare, data protection has never been so important. So when it comes to protecting your sensitive information online, there are steps you can take to leave yourself less vulnerable. 

 Here are my 10 ways to beef up your data security. 

  1. Back-up your data 

By creating a back-up copy of the data saved to your hard drive or database means you won’t lose everything in the event of compromise. Be sure to store this back-up version in a separate location from the original as this provides an even deeper level of security. Doing this regularly gives you a safety net and in the event you need to wipe the data from a stolen or lost device you won’t lose the data completely. 

  1. Use strong passwords 

Using a strong password can prevent headaches in the future. It makes your sensitive information harder to crack. Passwords should never be written down or given out unless completely necessary, and they also shouldn’t be the same across the board. If your password is the same for everything and it gets cracked then all your password protected data will be compromised. You should also be careful when putting your passwords into devices when in public as it is too easy for someone to take a peek and thus have access to your information. The same goes for putting credit card details in or any other sensitive information.

  1. Be aware of questionable emails and scams

The best way to know whether an email is suspicious or not is to check the grammar, bad spelling is often a good giveaway. If there is a sense of urgency, or payment requests then these are often indicators that the email is not from a genuine sender. Be sure to warn your staff about these types of emails too. Requests for information updates or refunds that seem out of the ordinary are often used as ways to get your sensitive data so always double check the sender/source before giving away your info. 

  1. Make use of anti-virus and malware protection

Keep these protections up to date too, hackers and data mining softwares are always updating their attacking approaches so you must keep your defenses up to date too. You can go further and install anti-spyware and firewall softwares too. These protections are one of the simplest ways to protect your data. A firewall is used to block risky viruses and spyware before they manage to make their way onto your device and are therefore a strong form of security. Firewalls can be installed onto mobile devices too, so there is nothing stopping you from locking down that sensitive data.

  1. Don’t leave your devices unattended

It may seem unlikely but beaches of data can happen when laptops, paperwork, and mobile devices are left unattended. Whether it is you or your staff, anything with personal or sensitive information should always be left under a watchful eye. Using public wifi is also something to be wary of. Public networks can be very insecure so using wifi in public can be a direct way for your private information to be accessed. Always be sure your connection is secure before opening sensitive information. Making sure your screen or mobile device is locked when you are not accessing it is another simple way to keep your data safe. 

  1. Review who has access to your data & personal information

Keeping on top of who has access to your data will save you potential problems in the future. While it may be easier to give access to all those you employ, it can leave your sensitive and private information vulnerable to attack or distribution without being able to identify how it was leaked. If your employees are away from work for a while or have left the company entirely then this is a good time to take away their access. Giving out your personal information to organisations or industries that you don’t 100% trust is never a good idea. If an organisation is asking for information that you don’t perceive they really need for the product/service they are providing then it is wise to ask why this info is needed, and perhaps hold off giving it until you understand why it is being requested. 

  1. Don’t hold onto data for too long and dispose of it properly

Holding onto your data for too long isn’t necessary, so you really only need to keep the data for as long as it remains relevant. When disposing of data or IT equipment be sure to wipe all sensitive information from the hard drives, hiring a specialist to wipe the data is a super safe way to make sure nothing is left behind. Florida office of the Attorney General made a suggestion that when getting rid of old data sources you should “Make old computers’ hard-drives unreadable. After you back up your data and transfer the files elsewhere, you should sanitise by disk shredding, magnetically cleaning the disk, or using software to wipe the disk clean. Destroy old computer disks and backup tapes. 

  1. Encrypt your data

While this sounds a little ominous it is not as scary as it sounds. John Naughton explained a few options for data encryption in an article for The Guardian “… GPG for Mail, for example, is an open source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard. And for protecting files, newer versions of Apple’s OS X operating system come with FileVault, a program that encrypts the hard drive of a computer. Those running Microsoft Windows have a similar program. This software will scramble your data, but won’t protect you from government authorities demanding your encryption key under the Regulation of Investigatory Powers Act (2000), which is why some aficionados recommend TrueCrypt, a program with some very interesting facilities,” 

  1. Know what kind of applications to enable and disable. 

A good approach to data protection is to download (safe and reputable) remote data wiping apps/software. These softwares then allow you to wipe sensitive data from your device if it is lost or stolen. Disabling your bluetooth when you’re not using it is another preventative way to protect your data. Bluetooth by its design requires connection to be strong and often localised so by switching it completely off it cuts off all opportunity for connection to be made and then your device exploited. You should also disable your file and media sharing across your devices when you don’t need it.

  1. Don’t give all access passes 

When it comes to your app configuration, it is always best to give apps you download as little access to your data as possible. So when you can make sure to adjust the settings on your mobile devices to reflect this. Reading the terms and conditions for apps and other softwares you download is another way to protect your data or at least have some understanding about what data is being accessed. 

If you need some more information or want to read further, here are some sources: 

https://ico.org.uk/for-organisations/sme-web-hub/whats-new/blogs/11-practical-ways-to-keep-your-it-systems-safe-and-secure/
https://www.oaic.gov.au/privacy/your-privacy-rights/tips-to-protect-your-privacy
https://www.digitalguardian.com/blog/101-data-protection-tips-how-keep-your-passwords-financial-personal-information-online-safe