Tag Archive: Information System Protection

Who has access to your systems?

Do you change system passwords when an IT person leaves? If not, why not? An article in today’s Register highlights the need to have a Leavers’ policy within all organisations and for that policy to be enforced. The article relates a recent court case where an ex-employee logged into his previous employer’s computer network and…

Distinguish between short term backups and long term archives

Backup systems are not the right place to store data for long periods of time There is a lot of confusion in the business community when it comes to protecting data. The problem is that few businesses understand the difference between short term backups and long term archives. This confusion has arisen because backup has…

Tip – Don’t leave the door open

Fire doors and walls are there to protect you – make sure you keep them closed. What sort of door do I mean? A physical door as in for example a fire door? Or do I mean a virtual door like your Internet connection? Doors exist to block a hole. They block the hole for…

Do you vet your staff and challenge visitors?

I am a fan of “New Tricks” on the BBC. It’s well scripted, and acted by professionals. Last night’s episode was on computer fraud and hacking. A key character was a member of the Met Police’s E-Crimes unit. He appeared in a scene and just waltzed in to the office and started working. Nobody checked…

Choose your Cloud supplier carefully, really carefully

If you transfer your Business to the Cloud, you’d better be sure they know what they’re doing A lot of business are considering moving some or all of their Information Systems to hosted environments in the Cloud. This has a lot of attractions: The start-up costs are a lot less than having your own hardware…

Don’t let data loss take your company down

The consequences of Data Loss can affect others as well as your own company. Consider this in your Business Continuity Planning. A client of mine had an interesting story to tell the other day that should serve to highlight the importance of Business Continuity Planning. I look after their IT systems and he rang to ask…

Alert – Keep an eye on your cyber defences

Do you pay as much attention to your cyber security as your physical security? A Register article warning of ‘disturbing’ levels of cyber-raids  prompts me to remind you that it’s not just physical security that the modern business needs to take seriously. I doubt that you leave the office unlocked at night and I daresay…

Know who can access your data

Do you outsource your IT support? Read on Are you in a regulated industry or do you hold any information that can be classed as being confidential? Have you outsourced your IT support? Then you have a critical question to answer. Has your IT support company signed a Non Disclosure Agreement that binds them to…

Document and test your restoration procedures

Systems fail at the most inconvenient time. Having a plan to follow will reduce down-time and stress. If you have computers in your business, and I bet you do, you will know from personal experience that sometimes they go wrong.  Usually this will cause only minor inconvenience but occasionally it can result in significant disruption…

Know who has the keys to the empire

Security is a lot easier to implement in the modern digital world, but enforcing it over the long term needs thought, and procedures that are adhered to. In the old days, security was simple. The main access control method was physical keys: to the building; to desks and filing cabinets; to the safe and strongroom….

Tag Archive: Information System Protection

Who has access to your systems?

Do you change system passwords when an IT person leaves? If not, why not? An article in today’s Register highlights the need to have a Leavers’ policy within all organisations and for that policy to be enforced. The article relates a recent court case where an ex-employee logged into his previous employer’s computer network and…

Distinguish between short term backups and long term archives

Backup systems are not the right place to store data for long periods of time There is a lot of confusion in the business community when it comes to protecting data. The problem is that few businesses understand the difference between short term backups and long term archives. This confusion has arisen because backup has…

Tip – Don’t leave the door open

Fire doors and walls are there to protect you – make sure you keep them closed. What sort of door do I mean? A physical door as in for example a fire door? Or do I mean a virtual door like your Internet connection? Doors exist to block a hole. They block the hole for…

Do you vet your staff and challenge visitors?

I am a fan of “New Tricks” on the BBC. It’s well scripted, and acted by professionals. Last night’s episode was on computer fraud and hacking. A key character was a member of the Met Police’s E-Crimes unit. He appeared in a scene and just waltzed in to the office and started working. Nobody checked…

Choose your Cloud supplier carefully, really carefully

If you transfer your Business to the Cloud, you’d better be sure they know what they’re doing A lot of business are considering moving some or all of their Information Systems to hosted environments in the Cloud. This has a lot of attractions: The start-up costs are a lot less than having your own hardware…

Don’t let data loss take your company down

The consequences of Data Loss can affect others as well as your own company. Consider this in your Business Continuity Planning. A client of mine had an interesting story to tell the other day that should serve to highlight the importance of Business Continuity Planning. I look after their IT systems and he rang to ask…

Alert – Keep an eye on your cyber defences

Do you pay as much attention to your cyber security as your physical security? A Register article warning of ‘disturbing’ levels of cyber-raids  prompts me to remind you that it’s not just physical security that the modern business needs to take seriously. I doubt that you leave the office unlocked at night and I daresay…

Know who can access your data

Do you outsource your IT support? Read on Are you in a regulated industry or do you hold any information that can be classed as being confidential? Have you outsourced your IT support? Then you have a critical question to answer. Has your IT support company signed a Non Disclosure Agreement that binds them to…

Document and test your restoration procedures

Systems fail at the most inconvenient time. Having a plan to follow will reduce down-time and stress. If you have computers in your business, and I bet you do, you will know from personal experience that sometimes they go wrong.  Usually this will cause only minor inconvenience but occasionally it can result in significant disruption…

Know who has the keys to the empire

Security is a lot easier to implement in the modern digital world, but enforcing it over the long term needs thought, and procedures that are adhered to. In the old days, security was simple. The main access control method was physical keys: to the building; to desks and filing cabinets; to the safe and strongroom….