How do you prevent a data breach?

Reading time 3 minutes

Hoe voorkom je datalekken?

Loss of portable data storage devices, such as USB sticks and external hard drives

It is easy to lose an external hard drive or USB stick. You should therefore always be aware of exactly what sensitive information is stored there and apply extra security measures for this information. You can do this via software (Bitlocker to Go) or by linking a password to specific files or (zip) folders. Our Service Desk can help with this.

A data breach, also known as a data leak or data spill, is the loss or unauthorized processing of personal data such as financial data, copies of identity documents or health data. Breaches can be intentional or unintentional. For example,  a list of passwords or credit card data that is (accidently) made public, a USB stick with confidential data left on the bus. There are also less tangible data breaches,  such as filling in online forms where the entered data is not sent over a secure connection.

Hoe voorkom je datalekken? Hoe voorkom je datalekken? Hoe voorkom je datalekken?

Office offers you the opportunity to secure your  documents with a password. Go to the menu via File. Select Info/Protect Document /Encrypt with password (Info/Document beveiligen / Versleutelen met wachtwoord)

Top targets of theft - smartphones and tablets

Phones or tablets are the most common targets of theft. Businesses often implement these devices, where they are then used to store confidential data such as business contacts, (business) email and business applications along with access to files (e.g. OneDrive for Business).

Hoe voorkom je datalekken?

Tip 1: Enable the unlock code on all devices. You will not be able to unlock the device without the code.

Hoe voorkom je datalekken?

Tip 2: Change your device’s default code (0000) into a personal one. iOS and Android do not use the same method.

Hoe voorkom je datalekken?

Tip 3: Higher security is possible, especially when there is risk of a serious data breach. An option on the phone will automatically delete files after multiple incorrect log-in attempts.

For iOS 10.2 you can enable this via Settings, Touch ID and Access Code.

On an Android device this security method will be different for every device and operating system. If you can’t find it, do not hesitate to contact the Service Desk.

In case of emergency the Sourcing Company Service Desk can, in the majority of cases, remotely erase business emails from the phone. Feel free to contact us if you have any questions.

Keeping your password safe

In addition to the physical loss of data storage devices, you can also lose their passwords. We provide a number of tips which will help you manage your passwords correctly and in doing so, better guarantee the security of your devices.

Hoe voorkom je datalekken?

Tip 1: Make sure you change your passwords periodically, once every 3 months, for example

Hoe voorkom je datalekken?

Tip 2: Never share your passwords with colleagues.

Hoe voorkom je datalekken?

Tip 3: Try to avoid writing down your passwords, or at least avoid placing them in full view (under your keyboard, on a post-it note attached to your screen).

Lock your work space

Always lock your laptop/work space when you are not using it. This will prevent anyone else from gaining access to your computer without needing to enter your password.

Hoe voorkom je datalekken?

 Windows lock: This is made easy with Windows by using the keyboard shortcut Windows-key + L. If you work via the terminal server or an RDS (remote desktop) environment, lock your screen with ctrl-alt-end..

Hoe voorkom je datalekken?

Apple lock: Lock your Apple or MacBook by swiping to a corner of the screen with your mouse. You choose the angle via Desktop and Screen Saver - Screen Saver - Hot Corner.

Hoe voorkom je datalekken?

For Apply users: If you prefer to enter a password before unlocking the screen you will have to set this up separately. (System Settings - Security & Privacy)

By The Sourcing Company | Dec 20th, 2017 | Nieuws

About the Author: The Sourcing Company

The Sourcing Company

Most recent posts