Digital Asset Protection
The balancing act: access and security
The key technological developments of the last few years have brought both great benefits to businesses and at the same time, enormous challenges. With the emergence of virtualisation, increased data portability and global cloud infrastructures, it is increasingly difficult to guarantee where your data is and who can access it.
Your digital assets are vital to your business: files, emails, confidential customer and employee information, business plans, financial data, product specifications.
Remote access and cloud technologies offer irrefutable benefits but come with risks attached. If you, like many others, are understandably wary of public cloud hosting, talk to us about opportunities for private cloud infrastructure.
Where, who, what and what if?
Just as you take out insurance to cover the risk of what might happen in your daily lives, you need to make sure that you have considered aspects of what may affect your digital world:
- Location: where is your data stored and what are the legal implications of the physical location of data?
- Access: who can read, copy, move or delete your data?
- Business continuity: what measures should you take to avoid data loss and to minimise loss of revenue and working time if you can’t get to your data or systems?
- Loss or theft of mobile devices
- Succession planning for business owners and entrepreneurs: who in your company has access to key digital information if you are not able to work?
- Providers: what information are storage and Internet service providers obliged to disclose about you and your company?
- Security: for your most sensitive and confidential data, should you be tracking who is accessing it and when?
Fencing in your most sensitive data
One vital way to facilitate data security is to remove data from the desktop and store it centrally where users can access it. This keeps critical intellectual property highly secure and helps radically simplify regulatory compliance. For maximum protection, place a data security wall around the terminal services remote session. Any attempt to extract data will be blocked and these attempts logged, providing an evidentiary trail.
Want more information on how you can protect your data? Do you need to know where your digital assets are stored and how they are being transferred? Get in touch.
Data in the cloud
One of the selling points of public clouds is that major companies like Amazon can offer services such as storage management, backup and recovery at vastly reduced rates because of economies of scale. That much is true, but it must be weighed against the risks of unauthorised access and lack of transparency about the actual location of your data. In this sense, the “cloud” is an appropriate description for a service in which much is undefined.
If you want to benefit from cloud technology but don’t want to run the risks of public cloud hosting, talk to us about opportunities for private cloud infrastructure. Our in-house expertise with virtualisation and cloud technologies in combination with our sensitivity to data security issues, may be just what you need.