Topics / Cyber Security / The Need for Security

The Need for Security

Whether it be personal or commercial, data is really valuable so it is important to keep it safe.

Data is sometimes deleted or corrupted accidentally, but this can also happen as the result of malicious actions. Either way, there are measures we can take to reduce the risk of this happening.

Malicious ActionsDeliberate unauthorised actions intended to cause damage by viewing, deleting, copying or corrupting data
Accidental DamageUnintended corruption, deletion or damage to data that is usually caused by human error
Data CorruptionData corruption refers to errors in computer data that happen during writing, reading, storage, transmission, or processing, which create unintended changes to the original data

Reducing the risk of accidental damage or malicious actions on a local level

  • Setting suitable access rights/user permissions, e.g. only allow staff to read/edit/delete the files that are required for their job
  • Password protecting individual files
  • Running regular backups, to another device or the cloud
  • Quality staff training
  • Monitoring of staff computer activity
  • Locking workstations when unattended
  • Sensible naming of files
  • Limiting the use of USB ports and email attachments
  • Saving work on a regular basis in case of unexpected shutdown
  • Use correct shutdown and start up procedures
  • Keep storage devices in a safe place
  • Set data to read only to prevent accidental editing

The internet and security

The internet has created many additional opportunities for malicious damage to occur to our data or the online systems we use.  This is not surprising due to our reliance on the internet and the amount of data we disclose over it.

These additional wider threats include:

Reducing the wider risk of malicious actions through the internet

  • Install anti-virus/anti-malware/anti-hacking software
  • Keep all software, including operating systems, up to date
  • Use strong passwords and vary these for different websites
  • Don’t download software from unknown sources
  • Be careful when opening email attachments and don’t click suspicious links
  • Make sure you are protected by a firewall
  • Watch out for the clues, like poor system performance
Topics / Cyber Security / The Need for Security

Popular Downloads