Close Menu
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Well Being
  • Marketing
  • HR & Recruitment
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
X (Twitter) LinkedIn YouTube
Trending
  • Developing an AI use policy
  • 3 learnings for SMEs from Climb24, the UK’s festival of innovation
  • Protect your start-up with a simplified shareholders’ agreement
  • Employment Expert Warns of TikTok Career Trends’ Negative Impact: Are Workplaces Falling Short?
  • Simply Asset Finance secures £120m loan facility from Bank of America
  • Campers acknowledges the impact of the North West adoption programme
  • Empowering ESMBs with Cutting-Edge Solutions: An Interview with Giovanni Crispino, Head of EMEA ESMB at Salesforce
  • Louise Hunt Skelley Ply And Samanta Bullock Launch A New Era Of Disability Advocacy
X (Twitter) LinkedIn YouTube
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
  • News
  • Home
  • In Profile
  • Finance
  • Legal
  • Technology
  • Events
  • Features
  • Wellbeing
  • Marketing
  • HR & Recruitment
SME Today
  • About
  • Advertise
  • Events Calendar
  • Business Wall
  • Subscribe
  • Contact
  • 0843 289 4634
You are at:Home»Technology»A successful hybrid working model means maximising data protection
A successful hybrid working model means maximising data protection

A successful hybrid working model means maximising data protection

0
Posted By sme-admin on September 22, 2022 Technology

John Michael, CEO, iStorage looks at how managers should be securing their business data to ensure the highest levels of security when permitting flexible modes of working.

The dynamic of the workplace has shifted. A hybrid or flexible model has become the preferred method of working for millions of employees, with remote capabilities allowing greater freedom to collaborate and innovate outside of the confines of the 9-5 office. Research into the attitudes of working professionals about the move to remote working as a result of the Covid pandemic found that over half of employees work remotely once a week[1] with 74% of professionals expecting remote work to become standard[2]. A significant 97% of employees do not want to return to the office full-time[3].

Yet, despite remote working creating various opportunities and benefits for employees and employers alike, the flexible model raises questions about the vulnerability of data and calls into question its security. Rising cybercrime and the emergence of ‘ransomware-as-a-service’ means that the safeguarding of company and personal data has never been more critical. Constantly carrying sensitive data between locations such as home, fixed office and even a co-work space, and using unsecured personal networks, could place companies at huge risk. It is therefore imperative, if the hybrid model is to succeed over the longer term, to consider how security hygiene can be improved.

Transporting files securely

Stories about laptops being left unattended on public transport make news headlines with alarming frequency. Transport for London revealed that an average of two laptops are left on the London Underground every single day[4]. The increase in flexible working means a corresponding increase in the number of devices that are potentially on the move, rather than being kept at a permanent desk within a fixed office. The likelihood of a device being left, or stolen, therefore dramatically increases.

To minimise risk and maximise protection it’s essential to consider encrypting files both in transit and at rest, so that if a device does fall into the wrong hands, the data it contains cannot be accessed or viewed. By encrypting data, businesses can enhance the security of their files as well as any communications that take place between client apps and servers.

Encrypting data in the cloud

The cloud is often the preferred option for remote workers to connect and collaborate. However, cloud security is a concern, meaning that a business might hesitate to utilise its services for the storage of highly confidential information. To ensure data privacy when faced with common threats such as DDoS and malware attacks, data must be encrypted. Yet, this requirement for encryption cannot be dependent on the cloud service provider (CSP). With server-side encryption, the encryption key is stored in the cloud and thus accessible to hackers and cloud staff alike.

The user needs full control of the encryption key in order to ensure the data is kept confidential even if the cloud account is hacked via, for example, a phishing email. Having a key management system will not only provide more control of encryption keys but it’s also more convenient for those using a multi-cloud solution. Therefore, removing the encryption key from the cloud and physically storing it within a PIN authenticated external USB module will allow users to access data stored in the cloud, while also being able to securely encrypt information from a local computer, a network drive, or sent via email or file sharing service.

Authorising access and centralising management

Businesses need a clear procedure that all staff must follow to uphold adherence to data protection regulations. Multifactor authentication is a highly recommended best practice for data protection compliance. If a hacker were to obtain a cloud user’s credentials, the breach would go unnoticed to the cloud service provider as it wouldn’t be able to differentiate a legitimate user from an attacker. The encryption module increases security measures to as much as five-factor authentication.

 Use of an encryption module by authorised staff will contribute to reducing the risk of data loss due to human error. Yet, this does not entirely eliminate the possibility of such an occurrence. For example, an individual may lose the encryption module or be dismissed and keep the device. This is where central management is needed. Those responsible for cloud and data security in the organisation should be able to monitor file activity, set geo-fencing and time-fencing restrictions, encrypt file names and disable users’ access to data remotely.

Backing up sensitive information

Finally, regularly backing up encrypted files is essential best practice. Using a 3-2-1 strategy, for example, means having at least three total copies of the data, two of which are local but on different mediums, and at least one copy stored off site. This ensures that businesses always have an up-to-date record of their valuable information, and that even if it falls into the wrong hands, it remains safe and secure.

Consideration should also be given to the means of data storage. A PIN-authenticated, encrypted USB flash drive or HDD/SSD with an on-device crypto-chip and AES-XTS 256-bit hardware encryption offers the highest levels of protection for sensitive company data. Adding an extra layer of security, such as a secure microprocessor that is Common Criteria EAL5+ Certified, brings into play built-in physical protection mechanisms which have been designed to prevent a wide array of cyber-attacks. It is also worth noting the importance of using a secure Wi-Fi connection, and checking that all security software is up to date to defend against attack.

Such considerations and processes will go a long way towards eliminating security risks and helping managers gain fuller visibility of the access and use of data by those working remotely. Retaining full responsibility for data encryption and management will contribute to maintaining business continuity, upholding compliance to data protection regulations and eliminating any complexity associated with flexible working models, resulting in peace of mind and safer data.

Learn more about data security:
https://istorage-uk.com/product-category/encrypted-hdds-ssds/

 

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The Steps to eCommerce Engagement are Now Easier than Ever

UK fails to break out as tech skills superpower on global skills leaderboard

Option to upgrade Euro 5 LCVs to Euro 6 emission standards

Comments are closed.

Follow SME Today on Linkedin and share all the topics you find interesting

The Newsletter

Join our mailing list to receive the latest news and updates from SMEToday
Read our Latest Newsletter:

Sign Up
Events Calendar
    • Marketing
    June 27, 2024

    Empowering ESMBs with Cutting-Edge Solutions: An Interview with Giovanni Crispino, Head of EMEA ESMB at Salesforce

    June 24, 2024

    Why Human Storytelling is Vital for Every Startup Marketing Strategy

    • Finance
    June 28, 2024

    Simply Asset Finance secures £120m loan facility from Bank of America

    June 19, 2024

    Do You Need To Insure Your Side Hustle?

    • Health & Safety
    April 15, 2024

    Careless Driving Habits Common Practice Among Motorists

    March 20, 2024

    Cleaning stairs, climbing ladders and changing light bulbs: which of these activities are allowed under health and safety rules?

    The Great British Expos 2024
    The Great British Expo's
    • Events
    June 18, 2024

    Get the Most Out of Your Ideas with IP. BWR IP Seminar

    June 3, 2024

    Nicola Peake Launches Peakefest to Inspire and Rejuvenate Business Founders

    • Community
    June 24, 2024

    Festivals Unite to Launch National Green Events Code

    May 10, 2024

    Breast Cancer Consultant Dr Hugo De La Pena Has Raised More Than £10,000 For Cancer Research

    • Food & Drink
    May 24, 2024

    Devon distillery raises a glass to future growth with £100k funding deal

    May 13, 2024

    Sussex mum toasts success as small business grows

    • Books
    March 5, 2024

    No Silver Bullet: Bursting the bubble of the organisational quick fix

    January 12, 2024

    Top lessons all entrepreneurs can learn from the boy who survived the wild

    About

    SME Today is published by the same team who deliver The Great British Expos’. We have been organising various corporate events for the last 10 years, with a strong track record of producing well managed and attended business events across the UK.

    Join Our Mailing List

    Receive the latest news and updates from SMEToday.
    Read our Latest Newsletter:


    Sign Up
    X (Twitter) YouTube LinkedIn
    Most Recent Posts
    July 2, 2024

    Developing an AI use policy

    July 2, 2024

    3 learnings for SMEs from Climb24, the UK’s festival of innovation

    July 1, 2024

    Protect your start-up with a simplified shareholders’ agreement

    June 28, 2024

    Employment Expert Warns of TikTok Career Trends’ Negative Impact: Are Workplaces Falling Short?

    June 28, 2024

    Simply Asset Finance secures £120m loan facility from Bank of America

    Categories
    • Books
    • Community
    • Education and Training
    • Environment
    • Events
    • Features
    • Finance
    • Food and Drink
    • Health & Safety
    • HR & Recruitment
    • In Profile
    • Legal
    • Marketing
    • News
    • Property & Development
    • Sponsored Content
    • Technology
    • Transport & Tourism
    • Well Being
    Copyright © 2024 SME Today.
    • ABOUT SME TODAY: THE GO TO RESOURCE FOR UK BUSINESSES
    • Privacy
    • Contact

    Type above and press Enter to search. Press Esc to cancel.