The Viking Blog

How to keep your business data secure

How to keep your business data secure

BYOD guidelines

BYOD, or Bring Your Own Device, is a growing trend in the business world. More organisations are allowing staff to use their mobile phones and tablets to access company data via work emails, the cloud and more. Although this can help you to save money and improve productivity, it is more risky when it comes to data security.

It is crucial that you lay out BYOD guidelines before letting staff access company data on their personal devices. They should have a strong password and remote wipe software, and an employee exit strategy should be agreed. See this Information Commissioner’s Office guide for more tips.

Data protection software

Unauthorised parties can gain access to your data using viruses, spyware, Trojans and more. It is therefore crucial that every company computer and mobile device is protected with security software from a trusted brand like McAfee or Norton. Make sure all programs are configured properly and kept up to date.

Training

Train your staff in IT security best practice, as many data breaches result from human error. Staff should:

  • Avoid opening suspicious emails, especially attachments
  • Use long, alphanumeric passwords for their online accounts
  • Never share confidential information without screening the recipient
  • Dispose of digital and physical information responsibly
  • Backup and encrypt their work
  • Only install authorised software onto their computer or mobile device

Office security

Defending your premises from intruders is necessary to preventing data loss. This means having a secure entrance, identifying everyone who enters the building, locking important documents away, and installing security alarms. You must also dispose of confidential paperwork responsibly. Use a shredder or employ an external specialist to take care of this waste.

Your staff should also use secure alphanumeric passwords, and all data should be encrypted. That means information on a stolen hard drive, for example, can’t be accessed.

Do you have any other data security tips? Share them in the comments below!

200-300-1

Share on FacebookTweet about this on TwitterPin on PinterestGoogle+Share on LinkedIn

Comments are closed.