- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- How to be confident when improving data security
-
-
Forums
- Products
- Servers and Operating Systems
- Storage
- Software
- Services
- HPE GreenLake
- Company
- Events
- Webinars
- Partner Solutions and Certifications
- Local Language
- China - 简体中文
- Japan - 日本語
- Korea - 한국어
- Taiwan - 繁體中文
-
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
- HPE Blog, Austria, Germany & Switzerland
- Blog HPE, France
- HPE Blog, Italy
- HPE Blog, Japan
- HPE Blog, Middle East
- HPE Blog, Latin America
- HPE Blog, Russia
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Blog, Poland
-
Blogs
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Blog, Latin America
- HPE Blog, Middle East
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
-
Information
- Community
- Welcome
- Getting Started
- FAQ
- Ranking Overview
- Rules of Participation
- Tips and Tricks
- Resources
- Announcements
- Email us
- Feedback
- Information Libraries
- Integrated Systems
- Networking
- Servers
- Storage
- Other HPE Sites
- Support Center
- Aruba Airheads Community
- Enterprise.nxt
- HPE Dev Community
- Cloud28+ Community
- Marketplace
-
Forums
-
Forums
-
Blogs
-
Information
-
English
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
How to be confident when improving data security
How can you be confident in your cybersecurity policies? Follow these steps to improve data security.
The need to improve data security has never been greater. Yet many IT leaders aren't confident in their organizations' ability to protect their data from evolving threats. Recent high-profile attacks and data leaks only reinforce the need to protect sensitive proprietary and customer information.
How can a business build confidence in its ability to improve data security? Start by following these key steps.
- Train employees to recognize threats. Numerous threats—such as Trojan horse programs, phishing emails, ransomware, spoofed links, and DDoS attacks—target employees who aren't likely to recognize them as threats. According to the Society for Human Resource Management, training employees to spot potential problems is critical to cybersecurity. Coordinate and conduct frequent training sessions with employees to keep them abreast of current and common security threats. An educated workforce is a secure workforce.
- Mandate strong passwords. Employees who pay little attention to their passwords are tempting fate—and a data breach. Address this risk by instituting a strong password security policy and strictly enforcing it. Compile and circulate a list of easily hacked passwords or password variations to make it clear that such passwords are not acceptable. Clarify, too, that employees aren't permitted to swap passwords for the sake of convenience.
- Install malware protection. There are many free and legitimate antivirus software programs that protect against malware. If your budget permits, consider springing for anti-malware solutions that offer more robust protection.
- Protect your mobile devices. When employees download apps from questionable sources, it increases the likelihood of hacking or mobile malware. Employees should not store any vital business data on their mobile devices, and it should be standard policy that no employee can download an app on a business-owned device until it's been evaluated and approved by the IT team.
- Ensure off-site data security. Public Wi-Fi networks are breeding grounds for hacking and information theft. Every business should add encryption to every business-owned mobile device, and emphasize to employees the importance of keeping tablets, phones, and other mobile devices used for work with them at all times. Businesses should also require employees to use a virtual private network when connecting to a Wi-Fi hotspot, log out after every active session, and set up two-factor authentication.
- Strengthen your data backup routine. Presumably, you have a data backup schedule in place. But there's always more that can be done, especially by data service providers who specialize in comprehensive backup protection. Service providers can often institute a higher standard of security than a business can accomplish on its own.
Every business, large and small, faces cybersecurity threats. By prioritizing data security and combining security-forward practices with strong networking security solutions, you can keep your business information and customer data safe and secure.
Optimizing data protection is just one best practice in a Hybrid IT environment. Find more in the HPE Best Practices for Hybrid IT: Tips for Midsized Businesses whitepaper.
A new era of cyber warfare has begun: hardware vulnerabilities and attack variants are growing in sophistication and numbers, elevating security and business risk. How well are you prepared. Check out this Frost and Sullivan on-demand webinar.
RobertChecketts
Robert has over 25+ years of IT Marketing and Product Management leadership experience spanning country, Regional and WW organizations. Robert is a marketing executive with extensive experience in field marketing, channel marketing and product marketing on a global basis and is driven to deliver SMB’s end-to-end affordable infrastructure that’s secure from the start, optimized for every workload, packaged for many consumption models, ready to scale, and easy to manage.
- Back to Blog
- Newer Article
- Older Article
- bcady on: Staying ahead of security threats
- Diana Schmidt on: HPE InfoSight for Servers expands across the portf...
- David Roman on: Just announced: HPE OneView 5.2. What’s new? Plent...
- shazebict on: How virtual server security and compliance procedu...
- Steven Johnson on: Achieve a global view into your IT Infrastructure ...
- jet web solutions on: How to find just right IT solutions for small busi...
- Jay 123548132 on: What's New with HPE OneView 5.0?
- Rajesh Vasudev on: What are RAID levels, and which are best for you?
- James Diaz on: What’s New with HPE OneView? Bring more composabil...
- ComputeExperts on: HPE InfoSight: Playing in a league of its own and ...
Hewlett Packard Enterprise International
- Communities
- HPE Blogs and Forum
© Copyright 2022 Hewlett Packard Enterprise Development LP