Data Security Recommendations

Data Security Recommendations

Because Good Security is an Ongoing Dedicated Practice

DataHive takes numerous steps and actions to ensure the physical data centre is secure and prepared for possible cyber-attacks. The systems in place protect, harden, and safeguard the infrastructure to protect clients from the next Ransomware, Data Breach attempt as well as the many other cyber threats and attacks.

In computing context, security includes both cyber security and physical security. These technologies, processes, and practices employed by DataHive are designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. Upon request from a colocation virtual client, DataHive will provide a proposal for the same level of protection within the client’s remote environment.

DataHive provides the services listed below to help further augment, harden and protect security settings already in use.

  • Additional backups with longer retention
  • Implement managed tracking of OS patches
  • Perform manual OS updates (snapshot, check, revert if failed)
  • Perform detailed network level security audits
  • Implement Network Intrusion Detection System
  • Implement Host Intrusion Detection system
  • Apply VPN set up and Management
  • Introduce a secure email policy for all employees to follow
  • Restrict application and Internet downloads to an approved list of known secure apps and sites
  • Distributed denial-of-service (DDoS) protection
  • Web Application Firewall (WAF) protection
  • Use strong passwords and change them regularly
  • Consider using two step verification

Security is Everyone’s Responsibility
Knowing and teaching employees and users how cyber criminals are threatening security is the first step to securing your information and your company’s future from data breaches to digital extortion. Use the summary below for reference.

Summary of the Security Report by a leading Security provider
While cyber-attacks manage to cause unprecedented levels of disruption, attackers frequently use very simple tools and tactics to make a big impact. Zero-day vulnerabilities and sophisticated malware now tend to be used sparingly and attackers are increasingly attempting to “hide in plain sight”. They rely on straightforward approaches, such as spear-phishing emails and “living off the land” by using whatever tools are on hand such as legitimate network administration software and operating system features. Other techniques include infected routers and security cameras – low powered and poorly secured devices. In the wrong hands, even relatively benign devices and software can be used to devastating effect.

Recommended Email Practices: Malware, Spam, & Phishing Security Policy

Best practices
DataHive’s Email Filtering Appliance helps defend against some email threats, but the most common and most dangerous threat is the uneducated email user. Therefore, it is crucial that every user must adhere to and execute DataHive’s email security policy below.

  • Delete any suspicious looking emails you receive, especially if they contain links or attachments
  • Be extremely wary of any Microsoft Office email attachments that advise you to enable macros to view its content – unless you are absolutely sure this is a genuine email from a trusted source, do not enable macros – instead, delete the email immediately
  • Always keep your security software up to date to protect against any new malware variants
  • Keep your operating system and other software updated – updates will often include patches for newly discovered security vulnerabilities that could be exploited by attackers
  • Be suspicious of emails that demand some action without following established procedures
  • Draft a reply with the supposed sender’s email address obtained directly from the corporate address book instead of simply hitting the Reply button, to ensure that a scammer is pushed out of the reply thread
  • Do not open and / or reply to suspicious emails
  • Do not give out sensitive information
  • Report suspicious or obviously bogus emails to the Security Administrator
  • Always create effective passwords to ensure they are strong
  • Change your passwords regularly
  • Never use links in an email to connect to a website unless you are sure they are genuine – type URLs directly into the address bar to ensure that you are connecting to a legitimate site and not one with an address that looks similar to it

See Also: Facility Overview