{"id":11962,"date":"2020-02-20T15:07:24","date_gmt":"2020-02-20T09:37:24","guid":{"rendered":"https:\/\/stg.tftus.com\/blog\/?p=1364"},"modified":"2025-12-16T07:52:54","modified_gmt":"2025-12-16T07:52:54","slug":"keeping-your-data-secure-in-2020","status":"publish","type":"post","link":"https:\/\/stg.tftus.com\/blogs\/keeping-your-data-secure-in-2020\/","title":{"rendered":"Keeping Your Data Secure in 2020: 6 Tips"},"content":{"rendered":"\n<p>Like it or not, data has become the lifeblood of the modern economy. For individuals, poor security can lead to identity theft, financial exploitation or misplacing priceless photos and documents.<\/p>\n\n\n\n<p>In business, the stakes \u2014 including liability and compliance concerns \u2014 are even higher. The following tips should provide a solid foundation for professionals, IT specialists, developers and others who want to rest easier at night. <\/p>\n\n\n\n<p><strong>1. Have a Third-Party Conduct an Audit<\/strong><\/p>\n\n\n\n<p>No shame comes with asking for help \u2014 especially for an issue as complex as cybersecurity and keeping data secure. A third-party <a href=\"https:\/\/stg.tftus.com\/blogs\/security-testing\">security testing service<\/a> can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Conduct a full-scope risk and liability assessment<\/li><li>Identify access control oversights and in-house data risks<\/li><li>Compare current approaches to emerging standards<\/li><li>Address shortcomings in partners\u2019 and vendors\u2019 digital practices<\/li><\/ul>\n\n\n\n<p>It\u2019s common for businesses to lack the in-house knowledge and resources to address their blind spots. Outsourcing to a firm dedicated to leadership knowledge in cybersecurity goes a long way.<\/p>\n\n\n\n<p><strong>2. Bring Machine Learning Into the Mix<\/strong><\/p>\n\n\n\n<p>Machine learning has practically become indispensable in the fight against data thieves and cybercriminals. The frequency and severity of breaches today, especially in large companies, is too massive to deal with manually.<\/p>\n\n\n\n<p>In 2018, a single company, Marriott, discovered <a href=\"https:\/\/www.marketwatch.com\/story\/data-breaches-soared-by-17-in-2019-but-theres-some-good-news-too-2020-01-29\">unauthorized access to 383 million<\/a> customer records. The scale of modern data theft efforts means we need far more efficient ways to perform access control in real-time. Machine learning and adaptive behavior modeling provide protections for precisely these types of threats.<\/p>\n\n\n\n<p>Adaptive behavior modeling learns overtime to tell legitimate users on your network apart from bad actors. It\u2019s able to <a href=\"https:\/\/imanage.com\/product\/imanage-threat-manager\/\">quickly identify questionable activities<\/a>, such as an unknown party accessing unauthorized files. As a result, companies can launch investigations in just minutes instead of days.<\/p>\n\n\n\n<p> <strong>3. Establish Clear Expectations for Clients and Employees<\/strong><\/p>\n\n\n\n<p>Company culture can be one of the most potent weapons in the fight against data thieves. How can IT specialists and business professionals get started?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> You can take a few steps when it comes to establishing best practices:<\/li><li>Instruct clients not to transmit financial documents or sensitive information over email or other unsecured channels.<\/li><li>If files must exchange hands, ensure they\u2019re encrypted first and then use a secure cloud service.<\/li><li>Employees should use strong passwords and know how to identify phishing attempts. Include this information in training.<\/li><li>Anyone who uses digital tools or connected infrastructure, such as IoT devices or PC workstations, should know to apply patches and updates.<\/li><li>Consider Outside Security Awareness Training<\/li><\/ul>\n\n\n\n<p><strong>4. Consider Outside Security Awareness Training<\/strong><\/p>\n\n\n\n<p>For any business that\u2019s part of a larger supply chain, the risk of weaknesses in the cyber-security-blanket is high. Plus, for any organization without the time or resources to put together their own training materials and exercises, it could make good sense to ask for help.<\/p>\n\n\n\n<p>Many companies don\u2019t feel confident about going it alone anymore. Recent research indicates the market for cybersecurity training <a href=\"https:\/\/cybersecurityventures.com\/security-awareness-training-report\/\">will reach $10 billion<\/a> by 2027. For companies that don\u2019t want to risk a fragmented approach across their supply chains, using a third party might be a good idea for getting <\/p>\n\n\n\n<p><strong>5. Lock Down Your Physical Security<\/strong><\/p>\n\n\n\n<p>Cybercriminals can find plenty of ways to brute force their way into databases from a distance. Given the nature of the threat landscape, it\u2019s easy to forget about the more tangible elements in cybersecurity policy. <\/p>\n\n\n\n<p>To start, it\u2019s essential not to let sensitive on-premises go unprotected. Networking equipment and server closets should not be accessible to anyone except trained and authorized personnel.<\/p>\n\n\n\n<p>Additionally, computers, hard drives, and other data storage devices should not leave the relative safety of the home base unless they\u2019re going straight to their destination \u2014 such as another company for repair. <\/p>\n\n\n\n<p>A recent example involved Facebook, which can\u2019t go a whole week without hemorrhaging user data. News broke in late 2019 that thieves stole hard drives containing <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2019-12-13\/thief-stole-payroll-data-for-thousands-of-facebook-employees\">payroll records on 29,000 Facebook employees<\/a> \u2014 from an employee\u2019s car.<\/p>\n\n\n\n<p>To keep data secure for any mobile devices containing sensitive data, ensure any available \u201cFind My Device\u201d feature is enabled and check that you can remotely wipe the machine \u2014 laptops, tablets, smartphones, etc. \u2014 should it go missing.<\/p>\n\n\n\n<p><strong>6. Include Two-Factor Authentication in Your Products<\/strong><\/p>\n\n\n\n<p>Physical security extends to two-factor authentication, too, as it requires the user to have access to a second device before they can log in to the app or digital property. Using this feature adds a few seconds to daily workflows, but the result is a far stronger defense against hackers.<\/p>\n\n\n\n<p>Anyone building an app, overseeing user accounts or managing company properties can and should prioritize 2FA during development or implementation. If you\u2019re using third-party tools, ensure 2FA is available, that it\u2019s enabled and that employees have received coaching on how to use it.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>How to Keep Your Data Secure in 2020<\/strong><\/h4>\n\n\n\n<p>With these data protection essentials, it\u2019s possible to keep our companies&#8217; and organizations&#8217; data secure. Staying safe is a team effort, so each one of us must play our parts conscientiously and consistently.<\/p>\n\n\n\n<p><br><br><\/p>\n\n\n\n<p> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Like it or not, data has become the lifeblood of the modern economy. For individuals, poor security can lead to identity theft, financial exploitation or misplacing priceless photos and documents. In business, the stakes \u2014 including liability and compliance concerns \u2014 are even higher. The following tips should provide a solid foundation for professionals, IT [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2476,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-11962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/11962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/comments?post=11962"}],"version-history":[{"count":1,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/11962\/revisions"}],"predecessor-version":[{"id":12419,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/11962\/revisions\/12419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/media\/2476"}],"wp:attachment":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/media?parent=11962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/categories?post=11962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/tags?post=11962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}