How to get the best out of your data protection services

by | Aug 16, 2013 | Security

To get the most benefit from data protection services start with low-tech physical security

You’ve implemented data protection services to protect your company systems from hackers, viruses and malware. Using a combination of software and stringent protocols, you guard important information from theft, loss, and other outside shenanigans. These high-tech data protection services and methods work best if you also implement some low-tech physical security first.

First on your physical security checklist, start by looking at the positions of your monitors, especially in public areas or reception rooms. Are they facing windows? If so, then anyone who walks by can see what’s being typed. You counter that on the fourth floor, nobody can peek in unless they’re flying. But did you notice the five-story building across the parking lot. Someone with a telescope or high-zoom camera can look inside your facilities. The simple solution is to turn your displays so they face away from the exterior.

Next on your physical security checklist — where are your old computers, tablets and smartphones? Are they sitting unused next to somebody’s desk? Do you know if anyone has taken them home and peered into their hard drives recently? Again, the solution is decidedly low-tech. Keep any unused equipment in a locked room. Make sure the keys go only to yourself or a trusted co-worker. So the two of you know who enters the room.

Make sure you have an inventory of all the items there. Implement a sign-up sheet or check out system so that anyone who removes a device must record his name, what he’s taking, why he’s taking it, the checkout time, and when he’s returning it. While you’re at it, require that all company smartphones, tablets, and laptops be stored in this room if they’re not being used. Good data protection services require that you know where all the devices holding information are located at all times.

YOU MIGHT ALSO LIKE:  Who is the US Cybersecurity Operations Team? And, what do they do?

If you want more information on how to protect the lifeblood of your business, please contact us. As consultants who specialize in data protection services, we can offer you total security and protection solutions.

Dale Shulmistra is a Business Continuity Specialist at Invenio IT, responsible for shaping the company’s technology initiatives — selecting, designing, implementing & supporting business continuity solutions to bolster client operational efficiencies and eliminate downtime.

subscribe

Business Continuity Newsletter

Join over 17,000 subscribers and receive weekly business continuity news, tips & advice to protect your business.

You have Successfully Subscribed!