13 Nov How To Protect Your Data
How To Protect Your Data
Information has become an essential part of our lives without it human life seems void, empty and aimless, we are in the information age an era of multi forms of information shared across different platforms and devices
Types of data: images, video, audio, documents, software, bank transactions, design blueprints, intellectual property, patents, receipts, invoices, client internet data usage, school reports, certificates, bitcoin – crypto currency wallets, user manuals, tutorials, just to name a few are all forms of information/data.
“Ways to prevent data from loss and/or unauthorized access.”
Early and Frequent Backup
The single most important step in protecting your data from loss is to back it up regularly. How often should you back up? That depends—how much data can you afford to lose if your system crashes completely? A week’s work? A day’s work? An hour’s work?
You can use the backup utility built into Windows (ntbackup.exe) to perform basic backups. You can use Wizard Mode to simplify the process of creating and restoring backups or you can configure the backup settings manually and you can schedule backup jobs to be performed automatically.
Productivity applications, such as Microsoft Office applications and Adobe Acrobat, will allow you to set passwords on individual documents. You can also set the type of encryption to be used. You can also use zipping software such as WinZip or PKZip to compress and encrypt documents.
Encrypt Your Data
Whole disk encryption locks down the entire contents of a disk drive/partition and is transparent to the user. Data is automatically encrypted when it’s written to the hard disk and automatically decrypted before being loaded into memory. Some of these programs can create invisible containers inside a partition that act like a hidden disk within a disk. Other users see only the data in the “outer” disk.
Disk encryption products can be used to encrypt removable USB drives, flash drives, etc. Some allow creation of a master password along with secondary passwords with lower rights you can give to other users. Examples include PGP Whole Disk Encryption and DriveCrypt, among many others.
Secure Your Wireless Data Transmission
Data sent over a wireless network is even more subject to interception than that sent over an Ethernet network. Hackers don’t need physical access to the network or its devices; anyone with a wireless-enabled portable computer and a high gain antenna can capture data and/or get into the network and access data stored there if the wireless access point isn’t configured securely.
You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).
Hope you enjoyed these informative ways – keep your data protected and safe.