Top Banner
Network, Web & Network, Web & eSecurity eSecurity Solutions Solutions Protecting Your Information Protecting Your Information
14

Protecting Your Information

Mar 17, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting Your Information

Network, Web & Network, Web & eSecurityeSecurity SolutionsSolutions

Protecting Your InformationProtecting Your Information

Page 2: Protecting Your Information

How Valuable is Your Data?• Consider how much it costs to create the

data initially and how much it will cost to replace. Can it be replaced?

• Backup media and devices will ALWAYS be cheaper than replacing data

Page 3: Protecting Your Information

Data Access• Define a structure to how project /

company information is organized

• Indexing & searching for quick access to hard to find information

• Archiving to protect closed projects

Page 4: Protecting Your Information

Data Protection• Allow only the necessary file and folder access

to users. Don’t leave everything open.

• File protection to retrieve deleted files

• Version control to maintain a history of particular documents

• Antivirus and Spyware

Page 5: Protecting Your Information

Backup Media• DVD

• Hard drive

• Tape

Page 6: Protecting Your Information

Backup to DVD• Ideal for project archives and file

distribution

• Pros: cheap media, readily available, easily accessible

• Cons: storage limits, poor backup automation

Page 7: Protecting Your Information

Backup to Hard Drive• Quick, simple alternative to tapes for large

data backup

• Pros: readily available, cheaper every day, easily transferable between computers

• Cons: not the most portable, mechanical failure

Page 8: Protecting Your Information

Backup to Tape• Best solution for large, frequent data

backup and offsite copies

• Pros: widely supported, easy to automate, large storage capacities

• Cons: higher initial costs

Page 9: Protecting Your Information

Tape Options• Travan – up to 20 GB • DAT / DDS – up to 36 GB• DLT – up to 800 GB • LTO – up to 400 GB

• Above values all native data per tape. Understand reported compression sizes which always assumes 2:1 compression.

Page 10: Protecting Your Information

Offsite & Redundant Backup• Have multiple offsite backups – monthly,

quarterly, yearly

• For critical items, make redundant backups (e.g.) accounting data, project archives

Page 11: Protecting Your Information

Common Failures• No regular backup

• No verification and validation

• Lack of structure / organization

• Open file access

Page 12: Protecting Your Information

Data Access Assessment• Are files and folders properly protected

from improper access?• Does the business have a standard way of

organizing project documents?• Is project email organized for team

members to share?• Can project documents be searched?• Is remote access available? If so, are

proper security barriers in place?

Page 13: Protecting Your Information

Data Protection Assessment• Is there live data protection? (RAID 1 or RAID

5)• Are scheduled backups done? When? Full?

Differential? Incremental?• Are offsite backups maintained?• Are redundant backups done for critical data?• Are backups checked?• Are backups tested?• How long will it take you to retrieve lost / deleted

files?

Page 14: Protecting Your Information

Questions