4 easy tips for to ensure data protection

Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation's data.
Jim Crook, Senior Director of Marketing, CTERA, shares his four key tips for protecting an organisation’s data.


Ransomware attacks have skyrocketed during the pandemic, by nearly 500%. The REvil gang took advantage of the 4th July holiday weekend to stage the US$70mn Kaseya ransomware attack, while the SolarWinds breach took place just before Christmas. It’s clear that cybercriminals do not take a day off. Year-round protection of your data is vital to safeguard it so that if an attack does occur, your company can continue to operate as usual.


Below are four essential tips for safeguarding your organisation’s most valuable asset: its data.

1. There is no excuse not to back up your data


a. It goes without saying that data backups are crucial. An external hard drive to store backup copies is simply not enough.


b. An effective data protection strategy involves storing at least one previous version for a specific retention period (a minimum of 30 days) in a read-only repository that is in a different location to the original. This is the absolute minimum.

2. End-to-end data security is key


a. End-to-end security is, of course, a must for protecting files against ransomware and other cyber threats. Having data security end-to-end implies encrypting data at the edge (where it is created), in transit (over the network), and in the cloud (where it is stored) in cloud-driven distributed setups.


b. Global file system technology can safeguard your data before it leaves your devices, workplaces, and servers by leveraging source-based encryption at rest and in transit. Furthermore, your data cannot be read even if it is temporarily locked due to an assault.

3. Consider who is viewing your files remotely


a. Remote access to an organisation’s files brings a significant number of benefits. However, if the wrong people are authorised to view specific files, this could lead to security issues. To mitigate this, ensure that your remote access system, whether VDIs, global file systems or others, meets corporate security policies and provides consistent access control from any personnel user device or location.

READ MORE:

4. Make sure that passwords are updated regularly (and are secure)


a. Employees relying on weak passwords are more likely to be susceptible to successful cyberattacks. When resetting a password, make sure it is a combination of letters, numbers, and symbols.

b. Keeping passwords safe on a multi-factor authentication password manager and updating them regularly is a simple and effective way to prevent passwords, and your data, getting into the wrong hands.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Birmingham Unveils the UK’s Best Emerging HealthTech Advances

Kosta Mavroulakis • 03rd April 2025

The National HealthTech Series hosted its latest event in Birmingham this month, showcasing innovative startups driving advanced health technology, including AI-assisted diagnostics, wearable devices and revolutionary educational tools for healthcare professionals. Health stakeholders drawn from the NHS, universities, industry and front-line patient care met with new and emerging businesses to define the future trajectory of...

Why DEIB is Imperative to Tech’s Future

Hadas Almog from AppsFlyer • 17th March 2025

We’ve been seeing Diversity, Equity, Inclusion, and Belonging (DEIB) initiatives being cut time and time again throughout the tech industry. DEIB dedicated roles have been eliminated, employee resource groups have lost funding, and initiatives once considered crucial have been deprioritised in favour of “more immediate business needs.” The justification for these cuts is often the...

The need to eradicate platform dependence

Sue Azari • 10th March 2025

The advertising industry is undergoing a seismic shift. Connected TV (CTV), Retail Media Networks (RMNs), and omnichannel strategies are rapidly redefining how brands engage with consumers. As digital privacy regulations evolve and platform dynamics shift, advertisers must recognise a fundamental truth. You cannot build a sustainable business on borrowed ground. The recent uncertainty surrounding TikTok...

The need to clean data for effective insight

David Sheldrake • 05th March 2025

There is more data today than ever before. In fact, the total amount of data created, captured, copied, and consumed globally has now reached an incredible 149 zettabytes. The growth of the big mountain is not expected to slow down, either, with it expected to reach almost 400 zettabytes within the next three years. Whilst...

What can be done to democratize VDI?

Dennis Damen • 05th March 2025

Virtual Desktop Infrastructure (VDI) offers businesses enhanced security, scalability, and compliance, yet it remains a niche technology. One of the biggest barriers to widespread adoption is a severe talent gap. Many IT professionals lack hands-on VDI experience, as their careers begin with physical machines and increasingly shift toward cloud-based services. This shortage has created a...

Tech and Business Outlook: US Confident, European Sentiment Mixed

Viva Technology • 11th February 2025

The VivaTech Confidence Barometer, now in its second edition, reveals strong confidence among tech executives regarding the impact of emerging technologies on business competitiveness, particularly AI, which is expected to have the most significant impact in the near future. Surveying tech leaders from Europe and North America, 81% recognize their companies as competitive internationally, with...