Digital Security Training A digital training brought to you by RSAT Security in partnership with Supreme Technologies Group.
Topics Covered Week 5 Week 1 Social Media Introduction to Information Security Week 6 Week 2 Responsible Organizations Use of Information Email and Website Best Practices Week 3 Week 7 Data Leakage Mobile Devices Week 4 Week 8 Responsible Use of the Internet Clean Desk Principle
WEEK #2 Re Responsible Organizations Use of Information
Wha What is s Information? n? • Information can be considered as data (both factual and numeric) that is organized and imbued with meaning or as intelligence resulting from the assembly, analysis, or summary of data into a meaningful form. • The value of information is determined by its importance to the decision maker or to the outcome of the decision being made.
Th The Infor ormation ion Lif ife Cycl cle
Wha What is s “I “Information n lifecycle”? ”? • Information lifecycle is the effort to oversee data, from creation through retirement, in order to optimize its utility, security, lower costs, as well as minimize the legal and compliance risks that may be introduced through that data.
Th The Information lifecycle • Creation • Storage • Use • Sharing – Next Week / Data leakage • Archive • Destruction – Next Week / Data leakage
Th The Information lifecycle - St Stor orage Where is your data?
Th The Information lifecycle - St Stor orage My files are “somewhere” on my computer (or network).
Th The Information lifecycle - St Stor orage Last week conversation with a client: Client: I have a very important presentation tomorrow and I cannot find my document. Me: Where was the file located? Client: On my laptop. Me: Where on your laptop? Client: Somewhere, I’m not sure. Me: Did you have a USB drive plugged in? Client: Oh…..yeah. I did. Me: Its probably on the USB drive. Therefore its not on your laptop. Go and find the drive.
Th The Information lifecycle - St Stor orage You cannot protect or secure your data if you are not sure where it is located.
Da Data Storage – Be Best Practices
Da Data S a Storag age B Best P Pract actice ices 1) Start using a Cloud based data storage service. Online cloud storage services provide you the ability to “synchronize” your important local data files to storage systems over the Internet. They provide backup against data loss as well as having secure access to your data from a variety of locations.
Da Data S a Storag age B Best P Pract actice ices The Top Cloud Based Storage services:
Da Data S a Storag age B Best P Pract actice ices 2) Have a backup of your data. Its easy! You should have multiple backups of your files. A backup will capture your files in “time” and will typically give you access to restore files from different periods of time. Our recommended backup software is in last weeks presentation.
Da Data S a Storag age B Best P Pract actice ices 3) Do not store your important data on USB flash drives! Have you ever misplaced your favorite pen? Its just that easy to misplace a USB drive. You are practically giving your data away.
Time for Q&A
For additional support for your organization, please email us at rsatinfo@rsatsecurity.com rsatinfo@rsatsecurity.com (212) 634-7276 est. 702 www.rsatsecurity.com
Recommend
More recommend