Data Loss Prevention: Securing your sensitive data

Knowing the risks

Cyber-attacks: How they happen?

  • Malware or Malicious software is designed to render a computer, server or system inoperable sometimes granting root access permission to the attackers so that they can control the system remotely.
  • Ransomware is a technique by which cybercriminals hold the victim’s data hostage by getting them to click on email attachments or links designed to make the system or data inaccessible. Perpetrators then demand a ransom to grant access back or by threatening public release of confidential information.
  • Phishing scheme too involves emails, but attackers may also use other techniques like text messages, social media quizzes, and even phone calls to trick the victims by disguising as a trustworthy entity and getting hold of critical data.
  • Denial of Service works by overwhelming a server or website with a flurry of bogus traffic until it is sent offline.

Mitigating the risk

  • Practice good password hygiene — The password for any purpose should be unpredictable and difficult to decipher.
  1. Don’t use personal information in the password.
  2. Include complex characters in the password to make it hard to crack.
  3. Avoid reusing the same password for multiple accounts.
  4. Keep changing your credentials from time to time.
  5. Never store passwords in your browsers.
  • Encryption — Unencrypted devices are prone to attack when they are lost, stolen or misplaced. Encryption is the simplest, yet most often neglected technique to protect your data. Even if an encrypted device is stolen or breached, the data will be useless for malicious actors.
  • Two-factor authentication — Enable two-factor/multi-factor authentication on externally reachable authentication endpoints wherever possible.
  • Regularly update the software — Your network is vulnerable to attacks when application software and operating system aren’t patched and updated.
  • Monitor activities and events surrounding the corporate data — Tracking the movement of data within the corporate network will give a greater understanding of your organization’s security postures and helps you prevent any unintentional access of sensitive information. A surge in network queries or slowdowns can be indications of an impending attack.

Taking security an extra step

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store