[BreachExchange] Data Storage Safety Tips For Sensitive Information
Destry Winant
destry at riskbasedsecurity.com
Thu Nov 1 14:15:44 EDT 2018
https://www.technotification.com/2018/11/data-storage-safety-tips.html
Following a data security breach that caught Yahoo!, the search engine
behemoth off guard and cost them $50 million in damages, data security
has come under the spotlight. Both corporations and individuals desire
to keep their data secure and that can be done with the right hardware
and software. But sensitive information requires an extra layer of
security and the right techniques for data storage can make a
remarkable difference.
Keep Sensitive Information In Separate Storage
One of the fastest ways for sensitive information to get into the
wrong hands is by not separating it from general data. An incident
involving the divulging of the personal information of cab drivers and
173 million cab rides drew attention to the importance of keeping
sensitive information separate. Although the information was
withdrawn, it wasn’t before it was hacked. This could have been
prevented if the information that needed to go out was kept separate
from the sensitive information.
Use Various Means Of Storage
For some, data storage for sensitive information is critical for the
long term. This means that the loss of this information can be
devastating. By simply making use of one data storage solution, it can
increase the risk of loss. Instead, make use of both digital and
physical data storage devices.
The digital storage options should have various security levels
including encryption. Physical data storage devices are small enough
to place into secure storage, such as a safe. Users should also
encrypt the data before saving it onto the device to add that extra
layer of security.
Use Trusted Storage Options
Secure data storage is not only about the potential loss of
information, but also the other losses related to the release of the
information. The city of Atlanta spent $2.6 million to secure data
after a ransomware attack. No matter how big or small the information
that needs to be secured, it’s imperative to follow the right data
protocols but more importantly, that the right product provider is
used to provide this storage.
Data storage locations such as Google Drive and Dropbox are infamous
for the number of hacking attempts. Choosing the right storage option
will largely depend on the potential for loss should that information
become compromised.
Choosing the right data storage options will depend on the information
that needs to be stored. Sensitive information will require additional
layers of security
More information about the BreachExchange
mailing list