Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How to Stop Worrying About Hackers and Start Protecting Data Assets

    By
    Chris Preimesberger
    -
    November 18, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1How to Stop Worrying About Hackers and Start Protecting Data Assets

      1 - How to Stop Worrying About Hackers and Start Protecting Data Assets

      The best way to relieve those nagging fears about stealthy cyber-attackers stealing your company’s data is to implement a comprehensive data security plan.

      2Focus on the Right Threats, not All of Them

      2 - Focus on the Right Threats, not All of Them

      Most organizations are dealing with threats from malware, malicious insiders, third-party attackers, corporate adversaries, hacktivist campaigns and more. No matter how many patches you apply across operating systems and employee devices, incidents like zero-day exploits can leave your team vulnerable. By prioritizing which threats matter most to your data and your industry, you can concentrate on the protection tactics that will pay off in the end.

      3Keep Your Data Inventory Up to Date

      3 - Keep Your Data Inventory Up to Date

      You can’t secure your sensitive information if you’re not even sure what you’re storing. Enact strict controls over where critical assets can reside in your company’s files and networks, and conduct frequent inventories of systems and devices to make sure nothing is slipping through the cracks.

      4Give All Data an Expiration Date

      4 - Give All Data an Expiration Date

      The most secure organizations are constantly poring over their data inventories, identifying which programs and files they don’t need and deleting them. Get in the deleting habit by giving all of your data an expiration date. When the deadline comes up, check with the data’s owner, then destroy it if it’s not still adding value to the company.

      5Don’t Disregard Updates, Patch Notices from Vendors

      5 - Don't Disregard Updates, Patch Notices from Vendors

      This habit should be obvious, but it remains a common factor in cyber-attacks. When tech vendors release updates about critical vulnerabilities and distribute patching information, take the time to install the patch. And while you’re at it, check for recent versions of the hardware and software you use daily. Older versions of devices and programs tend to carry known vulnerabilities that are just waiting to be exploited.

      6Keep Every User In The Loop About Security Issues

      6 - Train Keep User About their Role in Data Security

      User training and education is paramount to maintaining a secure IT environment. Share information about threats your company has faced in the past, present and future, discussing common issues as well as rare attack scenarios. Let security professionals lead the conversation for end users; meanwhile, invest in ongoing training for in-house security personnel.

      7Know That Hackers are More Persistent Than Smart

      7 - Know That Hackers are More Persistent Than Smart

      Maintain consistent security configurations among the devices in your organization that perform similar roles. Hackers tend to come through systems looking for vulnerabilities, such as the one server you haven’t gotten around to updating. Teach your network administrators that consistent changes and configuration control could be the factor that saves the company from a massive data breach.

      8Implement Least-Privilege Access Control

      8 - Implement Least-Privilege Access Control

      Remember the Target data breach in 2012 that dominated headlines and began with a third-party user that had access to the company’s network? Give the bare minimum of access permissions to the least number of people necessary to complete every task. Then, on a regular basis, ask resource owners and users to re-verify permissions and access rights.

      9Set Up Network Security Monitors and Pay Attention to Alerts

      9 - Set Up Network Security Monitors and Pay Attention to Alerts

      Most hacking incidents are captured on event logs and never recognized until after the incident is over. By aggressively monitoring for anomalous behavior and setting up alerts for specific issues, you can avoid finding out your system was breached six months after unusual activity indicated something was going on.

      10Get Your Team on the Same Page About Incident Response

      10 - Get Your Team on the Same Page About Incident Response

      More corporate executives are confronting this scenario: “Our data was breached today. What’s your next move?” Every member of your team should have a response to this question, whether their role will be dealing with remediating the system or communicating the news to customers and partners. If your incident response plan covers every possible scenario, you can make employees more security-minded by giving them some power to defend critical data.

      11Know Your Limits

      11 - Know Your Limits

      Even the world’s best doctors go to the doctor. Evaluate your organization’s core competencies and abilities in terms of how thoroughly you can protect your data. Then, cover the spaces in which you fall short by working with a trusted, reputable security partner. No organization looks forward to dealing with a security breach, but if an incident occurs and your team’s own ego is partially at fault, you’re adding insult to injury.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×