Updated News Around the World

Data and the policies that protect it: 4 essential plans to have in place

These four sample policies can help you protect your data by ensuring it’s properly encrypted, stored safely, only accessible by certain people, and securely backed up.

Data Security

Image: Andriy Onufriyenko / Getty Images

It’s been said we’ve gone beyond the information age and into the experience age, imagination age, fourth industrial revolution or one of a dozen other names for our current technological era. It doesn’t matter what we call it, the underpinning of it all is still information and data. 

There’s an inconceivable amount of information being generated daily around the world, and some of it is incredibly valuable to the right—and wrong—sorts of people. That’s where having proper data security policies comes into play: You need them, full stop. 

Protecting and securing data is more than just saying you’ll do it, though: There are a lot of things to be considered when thinking about how to secure data. Is it encrypted at rest? What about in transit? Is the cloud service hosting your data storing it and securing it properly? Which users have access, and how are they managed? These four sample policies from TechRepublic Premium will help you answer some of those questions in your organization.

This policy covers what should be encrypted, how it should be encrypted, examples of how to enforce encryption policies, which software to use for full-disk encryption and more. This policy focuses on data at rest and stored on organization-provided hardware, like laptops, servers, mobile devices and other hardware. 

View at TechRepublic Premium

Storing sensitive data in third-party cloud storage should at the very least raise the hairs on the back of your security team’s collective neck: It’s a risk, no doubt about it. Modern cloud providers have made security features part of their systems, but problems of regulatory compliance, loss of access, service outages and other problems make using the cloud a potential tinderbox. 

This policy will help you choose the right cloud vendors, determine what can and can’t be stored in the cloud, and how to handle other issues of access and security. It also covers how to handle the theft or loss of hardware with access to cloud services, and what to do to in order to better secure personal devices used for work.

View at TechRepublic Premium

People are often the weakest link in a security chain, and that includes the people you trust to manage organizational security. IT professionals need policies that cover how their access and privileges are assigned, managed, and monitored for violations. The policy covers access control for IT, as well as anyone else with administrator-level privileges on business systems. 

View at TechRepublic Premium

Two words for you: Ransomware recovery. That phrase alone should clue you in as to why end user data backups are essential. Employees can often have important data stored on their work machines, and if access is lost due to device theft or malware infection there’s a quick, easy choice if a backup has been made: Just restore the infected machine, or a new one, so the employee can go on working. This policy will help you establish guidelines for setting up an environment where backups are routine, expected, and reliable. 

View at TechRepublic Premium

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsUpdate is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.