Safeguard your work data

Steps you need to take to ensure business data is protected all the time

Published Date
14 - Jul - 2014
| Last Updated
27 - Nov - 2014
 
Safeguard your work data
If you're running a business, you of all people should understand the importance of data security and integrity. It doesn’t matter how small or big a threat may be, or its type or nature, there will be consequences (reputation, legal charges, losing competitive edge, and other unforeseen damages) for any breach of your company's data and in some instances even irreparable damage. Unless you run a completely offline business, chances are that you have a fair amount of interaction with the web, which is rapidly becoming the top infection point for all sorts of security vulnerabilities. Seeing how security vendors are always releasing not-so-encouraging reports about the online threat landscape, it is important to understand and acknowledge the fact that unless protected your data is under constant threat.  
 
There are a number of steps that one should take to safeguard and secure data before it’s too late. We share a few basics that shouldn’t be ignored.
 
Secure your network and connections
While working from home, how do you ensure that you connect securely to your office server for an urgently required file? Virtual Private Networks or VPNs is the answer, think of it as your very own private, completely secure tunnel through the internet. Windows 7 has a built-in VPN feature which you can explore (just type “VPN” in the Start Menu field) to hook up two computers. You can also check out pretty good third-party solutions like OpenVPN or Hamachi which are free and easy-to-setup. For your wireless office network, don’t ignore the basics: ensure you deploy WPA2 encryption with a difficult passphrase and MAC address filtering at the router level.
 
Encryption shouldn’t be ignored at all
Make data encryption part of your work policy, whether you have two or twenty employees. Every computer that has business data on it should be encrypted at the hardware and software level to ensure that even if a laptop is stolen or lost, the data on it is always encrypted and impossible to recover. Tools that let you do this are TrueCrypt, an open source favourite, and Windows’ own BitLocker utility. Both of them are used to securely encrypt entire hard drive volumes with or without hardware encryption via TPM (trusted platform module), deploying different authentication methods. 
 
Online backups are critical
If your office PC hardware is old or aging fast – disk drives whirring too loudly, with audible clicking sound – it’s important to backup your data at short, fixed intervals before disaster strikes. Backing up critical business data online is increasingly becoming a cheaper alternative with a myriad cloud backup services. While there’s nothing wrong in services such as Dropbox.com and Nortonzone.com, if you just want some cloud to offload your business data on to. But we recommend investing in a dedicated service that offers support and other features. 
 
Check out the likes of SpiderOak (www.spideroak.com) and SOS Online Backup service (www.sosonlinebackup.com) – the former encrypts and never deletes your data, offering a free 2GB service with the ability to backup and sync data across a host of machines including mobile devices, while the latter offers incremental backup and syncing of data from PCs and even attached network drives at an affordable price. 
 
Backup offline as well
Another way to tackle data disasters is to always keep offline data backups to ensure there’s minimal impact on business and quick restoration of data. Of course, online backup solutions are equally important and shouldn’t be ignored, but downloading data from the cloud can take time. Offline data backup policies, whether on a central server, NAS, just another always-on PC or an external drive, can be put in place and configured in a matter of minutes with the following applications.
 
For Windows machines, Windows Home Server offers the best experience in terms of ease of use and setup – it’s got all the basic features as well. Do also consider tools such as Acronis True Image Home or Rsync – the latter being an acclaimed cross-platform backup software. 
 
Mac users don’t need anything else apart from Time Machine, a free tool already present in OS X which does the job. You can probably supplement it by purchasing a Time Capsule, a cute external drive that backs up data wirelessly through Time Machine.
 
Mobile shields
While most of us have desktop security software running around the clock, we may ignore mobile security apps or not attach as much importance to them as their desktop counterparts. From now on, don’t. With the advent of BYOD (bring your own device) policy at workplaces, it’s difficult to track where your office data travels – smartphones and tablets, we’re looking at you. It’s critical to counter the threat of mobile security.
 
Apart from trying out mobile apps from popular security vendors, check out Lookout Mobile Security (www.lookout.com) which does a pretty good job of securing your mobile device and the data on it, besides backing it all up in the cloud. The app is in a constant state of vigilance, safeguarding you against malicious app or connecting to an unsecure Wi-Fi hotspot, besides letting you remotely control and manage data on your phone through a Web browser and even find a missing handset. 
Jayesh ShindeJayesh Shinde

Cower, puny human, for I am Big Daddy! The ground rumbles beneath my feet, the very air you breathe resonates to my primal roar. Mere mortals, I am the scourge of the n00bs, destroyer of worlds. Fear my might, tremble in my presence.