logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
8th March 2019 by CyberVision 0 Comments 770 Views
8th March 2019 by CyberVision in F-Secure

3 Tips to determine which assets need the most protection

The key asset that a security solution helps to protect is your data — and a major part of the value of many businesses is often in their data. Investing in your company’s network security is the first line of defence between your business and online attackers, however, no solution is 100% impenetrable. Most companies simply aren’t protecting their digital assets appropriately and this is one of the reasons why there are still so many breaches taking place.

 

It is then necessary to develop a security programme to identify what data is covered and what is not. Such a programme will assess the risks your company faces and how you can plan to mitigate them. Your entire network needs to be secured, but not everything in your network is equally sensitive. Your company’s security programme will also need to indicate just how often the programme will be re-evaluated and updated so that you know which assets justify additional controls.

 

Here are three tips to help identify which assets are the most important to protect:

 

  1. Determine your company’s ‘money-maker’

These are the assets that are fundamental to the success of your business. This could typically include customer information, intellectual property and future business plans.

  1. Identify other sensitive data that may not be as valuable as the ‘money-maker’

These are items that wouldn’t necessarily put an end to your organisation if they were to be leaked, but could cause harm to your business or reputation.

  1. Create a threat model for your business

Figure out the kinds of attackers who are most likely to target your business and what assets these attackers are after.

 

Keeping organisations safe also relies on constantly educating employees about identifying suspicious communications and new possible risks. In order to eradicate errors made through social engineering and to raise awareness of the potential caused by carelessness, technology and processes must be combined with employee education. This way, employees are aware of the threats they face and the part they are expected to play in guarding against them. Organisations that focus on people, processes and technology collectively, have a better understanding of what they’re up against.

 

And then of course there need to be reliable and regular backups of all your critical data and these backups also need to be kept off site in a safe environment so that they can be used immediately in order to recover from a data breach or attack such as ransomware. The backups need to be done as often as is necessary to avoid as much disruption to the business as possible – which could be hourly, daily or weekly, depending on the nature of the business. And when backups are being done, bear in mind that they are also vulnerable to attack whilst connected to your network so separate devices need to be used to alternate the backups and a recent backup that is totally disconnected from the network at any one time should always exist.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo