- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- How to be confident when improving data security
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
How to be confident when improving data security
How can you be confident in your cybersecurity policies? Follow these steps to improve data security.
The need to improve data security has never been greater. Yet many IT leaders aren't confident in their organizations' ability to protect their data from evolving threats. Recent high-profile attacks and data leaks only reinforce the need to protect sensitive proprietary and customer information.
How can a business build confidence in its ability to improve data security? Start by following these key steps.
- Train employees to recognize threats. Numerous threats—such as Trojan horse programs, phishing emails, ransomware, spoofed links, and DDoS attacks—target employees who aren't likely to recognize them as threats. According to the Society for Human Resource Management, training employees to spot potential problems is critical to cybersecurity. Coordinate and conduct frequent training sessions with employees to keep them abreast of current and common security threats. An educated workforce is a secure workforce.
- Mandate strong passwords. Employees who pay little attention to their passwords are tempting fate—and a data breach. Address this risk by instituting a strong password security policy and strictly enforcing it. Compile and circulate a list of easily hacked passwords or password variations to make it clear that such passwords are not acceptable. Clarify, too, that employees aren't permitted to swap passwords for the sake of convenience.
- Install malware protection. There are many free and legitimate antivirus software programs that protect against malware. If your budget permits, consider springing for anti-malware solutions that offer more robust protection.
- Protect your mobile devices. When employees download apps from questionable sources, it increases the likelihood of hacking or mobile malware. Employees should not store any vital business data on their mobile devices, and it should be standard policy that no employee can download an app on a business-owned device until it's been evaluated and approved by the IT team.
- Ensure off-site data security. Public Wi-Fi networks are breeding grounds for hacking and information theft. Every business should add encryption to every business-owned mobile device, and emphasize to employees the importance of keeping tablets, phones, and other mobile devices used for work with them at all times. Businesses should also require employees to use a virtual private network when connecting to a Wi-Fi hotspot, log out after every active session, and set up two-factor authentication.
- Strengthen your data backup routine. Presumably, you have a data backup schedule in place. But there's always more that can be done, especially by data service providers who specialize in comprehensive backup protection. Service providers can often institute a higher standard of security than a business can accomplish on its own.
Every business, large and small, faces cybersecurity threats. By prioritizing data security and combining security-forward practices with strong networking security solutions, you can keep your business information and customer data safe and secure.
Optimizing data protection is just one best practice in a Hybrid IT environment. Find more in the HPE Best Practices for Hybrid IT: Tips for Midsized Businesses whitepaper.
A new era of cyber warfare has begun: hardware vulnerabilities and attack variants are growing in sophistication and numbers, elevating security and business risk. How well are you prepared. Check out this Frost and Sullivan on-demand webinar.
RobertChecketts
Robert has over 25+ years of IT Marketing and Product Management leadership experience spanning country, Regional and WW organizations. Robert is a marketing executive with extensive experience in field marketing, channel marketing and product marketing on a global basis and is driven to deliver SMB’s end-to-end affordable infrastructure that’s secure from the start, optimized for every workload, packaged for many consumption models, ready to scale, and easy to manage.
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If you’re not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYC™ 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
160 -
HPC & SUPERCOMPUTING
138 -
Mission Critical
88 -
SMB
169