About
Subscribe

KO'd? Five rules to protect data when staff leave

Johannesburg, 19 Nov 2009

Boxing South Africa officials this week alleged that the organisation's former CEO, Bongani Khumalo, “wiped valuable information from their computers”.

This is by no means a new phenomenon or an isolated incident. Every day companies are at risk of serious data breaches from various sources, including staff members that are retrenched, fired or somehow disgruntled with the organisation.

In fact, the latest research conducted by IT security firm, Cyber-Ark Software, indicates that:

* Fifty-eight percent of Wall Street workers say they have already taken data from their company.
* Seventy-one percent said they will take data if faced with the prospect of retrenchment.

The same can be said for South Africa, where companies have been, and still are, forced to retrench staff on all levels in order to better cope with a challenging economic climate.

The question is: How do companies and organisations keep themselves, and their data, safe from rogue employees, sometimes even senior ranking individuals such as CEOs?

Here are the 'Five Golden Rules' Cibecs believes every company should follow:

1. You must have local disc encryption: Products like Safeboot, PGP and open source options like TrueCrypt encrypts the data on an individual's notebook or desktop, in addition to the data being backed up and encrypted by an effective data backup and recovery software solution.

IT can pre-empt an employee removing information by changing the password settings to decrypt the data.

2. Protect the right data: Choose backup and recovery software that allows you to decide what kind of data, from which users, should be backed up and protected. You do not need music, movies and photos taking up your storage space.

3. Make sure your backed-up data is also encrypted: The backup and recovery solution you use should automatically encrypt your data. This is an especially important feature when it comes to compliance and data breach notifications. Anyone with IT access can always access data stored on the server.

4. Split management and data access: A centrally managed system, accessible by only very specific individuals, is the way to go and safeguards the company against possible action from even the most senior executives.

5. Asset tracking and remote data destruction is not enough. This has more to do with your hardware being taken, but employees have been known to disappear with company notebooks before.

Products like Net Trace allow for asset tracking and remote deletion of the information - but then the data is lost forever. If the data is backed up, you can go ahead, click that button and make a very nice doorstop out of that shiny notebook.

The bottom line

Any business or organisation runs the risk of data loss through various means. More often than not, the risk comes from within. Protect your data from anything - and anyone, by installing an effective data backup and recovery solution for the desktops and notebooks in your company.

The next 'knock out' punch should be yours to give.

See how Cibecs can help your business by visiting Data backup and recovery or phone us on: +27 (0) 11 791 0073.

Share