Chapter 26. Ten Tips to Prevent Data Loss Today
We figure that if you're reading this chapter first, it's because you're in trouble — or at least you think you might be. Hey, we've all been there, so here are some steps you can take today.
Identify what information you have that needs to be protected
Remember: We aren't looking for all information, just the sensitive and confidential information — the stuff that will make you (horrible) front-page news if it wanders off! Start with the obvious — customer details and product designs — and work from there.
Now you know what you're looking for!
Identify where sensitive information resides
This sounds simple, but is it? Computer systems hold the information — servers, desktops, laptops, and external hard drives. For starters. Then you have mobile devices, mobile phones, PDAs. After this come other gadgets such as digital cameras and perhaps USB storage devices. Finally, you have to list all the people with whom you share the information — partners, suppliers, and even customers.
Now you know where it is!
Identify who has access to sensitive and confidential information
The quick answer is only those who should. The actual answer is more than you thought. This is all about figuring out who has access — and who needs access. Chances are that 90 percent of the people who have access don't need it. Check it out, remove access where it makes no sense, and reduce the risk.
Identify processes involving sensitive information
How is the information used ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access