We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The 4 Fundamentals to IT Security

At a recent security event, VP of Gartner Neil MacDonald broke down the fundamentals of IT security into four categories, "Information security was never about device lockdown, or dictating applications, or building firewalls. It was always about protecting the confidentiality, the integrity, the authenticity, the availability of information." Here's a closer look at these four security qualities.

Data Confidentiality
One of the biggest roles of IT security is protecting sensitive information, especially concerning the data that needs to be kept confidential. In a company's IT network, sensitive data is exchanged between multiple parties like customers, employees, and even yourself. You will want to have strong protections in place to assure that only the people meant to see the information will be able to access it. For example, only your accounting department should be able to view your employees' bank account information. A breach in data confidentiality will put victims at risk of identity theft and make your business liable for damages.

Here are six examples from Cornell University of data that your business needs to keep confidential.

  • Data used to uniquely identify people.
  • Data used to pay or reimburse people.
  • Data used to provide employment benefits.
  • Data used to support business-related travel and lodging.
  • Data used to understand the financial status of a person.
  • Data used to fulfill obligations to the government.

Data Integrity
Data integrity doesn't refer to the truthfulness of information, but rather, data integrity is about maintaining and assuring the accuracy and consistency of data over its life-cycle. An IT network that's been properly maintained and upgraded will have no problem accessing a file created back when the company was running Windows 98. Poor network security is shown when files are lost and unintended changes happen to the data during an upgrade, hardware failure, situation of malicious intent, or regrettably, human error.

Data Authenticity
Software isn't meant to be modified. If a program is hacked or messed with by a user for any reason, then it's no longer guaranteed to work in the future. A software modification can really come back to bite you when you're not able to complete an operation due to broken code, or data becomes damaged or lost. Also, a user that's in the habit of modifying their software may be in direct violation of the software's licensing agreement. If a software manufacturer were to find out that someone in your organization modified their code, your business would be liable and in for a world of legal hurt.

Data Availability
If your data isn't available when you try to access it, then your network protection policies have failed, but data availability goes beyond data integrity. Data availability means that your data is available no matter the circumstance. This includes accessing your data during peak network traffic, and even in the event of, or shortly after, a major disaster. Having a Data Backup and Disaster Recovery plan (BDR) is one of the fundamental components to having solid IT security for your business. Preferred can cover your data availability needs with our BDR solution. BDR will virtualize all of your network's data in the event of a disaster, meaning you can access it and keep working even if your in-house network is down.

Whether you store and manage your data in-house, or if you take advantage of a cloud data storage service, it's vital for your business that these four IT security categories regarding data management are covered. You will achieve this by properly managing the data usage and storage policies on your network, along with having a strong security solution in place like a Unified Threat Management tool. Preferred can help you with all of your data management responsibilities to ensure that your business is protected from security threats. Call us today at 708-781-7110 to learn more!

Businesses Still Prefer Windows 7
Protect Your Business with Intelligent Surveillanc...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, December 23 2024

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      Stuff happens, and this stuff can often be bad. That’s an inescapable part of life, especially if you’re trying to run a successful business. That said, the consequences of this bad stuff can usually be minimized—if not mitigated entirely—when you have a proper disaster reco...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.