Protecting the intellectual property of my company
The problem:
Firewalling is all about preventing malicious access from the outside. However, a large part of unwanted data usage comes from inside: have I set up a protection system for my key data?
Data protection has become a hot topic, as more and more stakeholders are now seeing their data as a key asset. Being able to dispose of them in any circumstance, even in case of a crypto locking (ransomware) attack or blackout, is essential. While it is often unrealistic to try and protect 100% of your data, we suggest you should have a look at the following recommendations.
5 key recommendations you should keep in mind
- Define what data are key for the company’s operation: financial and commercial data, R&D plans and results, might be in the lot.
- Make sure these data, and their succeeding versions, are thoroughly protected against unwanted reading, alteration, leakage, and that they are always accessible, even if a problem on the usual systems occurs.
- To reach such an objective you may want to use systems that encrypt the data, or some of them. You may also use a tool with ID management and make sure only authorized persons access them. Storing clear-text data in the cloud must be questioned. Responsibility for encrypting is to be clearly determined (The company itself? The cloud provider? Or a shared responsibility model?).
- If encryption is your choice, it is important to look out for solutions that minimize the impact of data protection: building an own search index, for example, helps to maintain cloud service functionality, such as searching and sorting, reporting, and keeping analytical capabilities.
- If some leakage occurs despite your efforts, you must be confident that you will get notified before the leakage spreads and has a negative impact on your business and image. Data trails and audits show up any internal malicious data attacks and leakages.
Download and consult our Cybersecurity Guide for more recommendations:
[button size=” style=” text=’Cybersecurity Guide’ icon=” icon_color=” link=’https://02cecbc4.sibforms.com/serve/MUIEAM83fr_Gw61i-LpqMqqt0rI8TSaPYHe9IsjAYGAsePsEeyIql8RauS5KVpRGEpttkI2Frf447WwnrHem1E8hkYbx4jcAQQE670E2t0b-KuBBqLanQRYXp55_DsBAG3AWpnsSzUi-v5dOx5iowwZzRkmiZOB1GNhKARgpSLdTC6qs6DCuNpI9SOd9hzXhzU3dBPClu1mFGw34′ target=’_self’ color=” hover_color=” border_color=” hover_border_color=” background_color=” hover_background_color=” font_style=” font_weight=” text_align=” margin=”]