The digital data has ingrained itself as an integral part of modern business. It has transformed the way business is conducted and opened grand vistas. With opportunity however, comes responsibility. The cyber world has unfortunately plenty of potential for someone with malicious intent. With remote working and increasing cyber attacks it is critical that we have measures to safeguard digital data.
Give below are a few regular and simple practices that can be followed to safeguard from Cyber Attacks and Risks.
Passwords are the first line of defence for any program. Having good passwords greatly enhances security whereas bad passwords may even negate the effects of other controls measures that are implemented.
Best practices:
Controlling who has access to the system is perhaps the most obvious way to ensure security. Every person who has access to the system must.be a legitimate user. A legitimate user is one who has a valid reason for requiring access, whose identity can be verified and does not have malicious intent.
Best Practices:
3. Secure Wi-Fi & Devices
Wi-Fi, though greatly convenient, can pose a security threat for that very same reason. Extra care must be taken while using Wifi to ensure security.
Best Practices
4. Legitimate Software:
Developing software is a complex process. Good software can have great functionality and ensure protection but faulty software could make an otherwise secure system vulnerable.
Best Practices:
5. Patches and Anti-Virus:
Patches are updates to software. Patches are deployed by the software manufactures to not only enhance the software but to also increase security. Software patches must be updated at the earliest but care must also be taken that the patch does not lead to a disruption is business.
Anti-Viruses are designed to prevent malicious software from entering the system and causing harm. An up to date Anti-Virus ensures the safety of the entire system.
Best Practices:
6. Clean devices:
Though great for carrying legitimate information, USBs could also be a carrier of viruses or other forms of malware. Care must be taken to ensure that the system is not compromised by unfamiliar information portability devices.
Best Practices:
7. Social Media:
Social media is one of the most literal manifestations of the saying “the world at our fingertips”. Sensitive content once released onto social media is almost impossible to erase.
Best Practices:
8. Email:
Emails has allowed communication to occur at the speed of thought. But it has also created the information explosion.
Best Practices:
9. Regular Backups:
Data can be volatile. It’s easier than you would expect to lose data. Maintaining at least one detailed copy of all important data is maintained at a secure location ensures robustness.
Best Practices
10. Bring Your Own Devices:
The use of personal devices for work has been a trend that has picked up greater momentum is recent years with the advent of smartphones, tablets and other such devices with high computational capabilities. It has also brought about an increase in the number of devices that must be taken into consideration for the purpose of security.
Best Practices:
The above mentioned practices are just the beginning. Due to the inherent complexity of the cyber environment, new threats are created just as fast as security measures can be developed. The perpetual race between threats and security controls is bound to continue. It is ever important that we maintain vigilance and keep ourselves updated of the new possibilities and dangers.
The author CA Narasimhan Elangovan, is a practising CA and partner KEN & Co. He is a GRC Professional, a Digital transformation catalyst and an author. He believes in the power of technology to solve everyday problems. He can be reached at narasimhan@ken-co.in