Good 360
MEDIA, JOBS & RESOURCES FOR THE COMMON GOOD
Sponsored  |  Social Innovation

Simple Formula to Keeping your Data Safe


Tuesday, 14th November 2017 at 8:08 am
Contributor
With more and more Australian organisations moving their workloads to the cloud, it’s important to ensure data remains secure, says not-for-profit technology specialists Brennan IT.


Tuesday, 14th November 2017
at 8:08 am
Contributor


1 Comments


FREE SOCIAL
SECTOR NEWS

 Print
Simple Formula to Keeping your Data Safe
Tuesday, 14th November 2017 at 8:08 am

With more and more Australian organisations moving their workloads to the cloud, it’s important to ensure data remains secure, says not-for-profit technology specialists Brennan IT.

The not-for-profit sector is one of the most important industries when it comes to data security, as breaches and leaks can have major impacts on the lives of Australia’s most vulnerable. In today’s cloud connected world, security should always be front of mind.

Stringent measures need to be put in place to protect sensitive data. However, not all data is equally important, so it’s not always necessary to apply the strictest security policy on every application. By taking a staggered approach, organisations can be efficient with their resources, while still having peace of mind. The first step is understanding your data and there is a simple formula to help.

You should start by objectively assessing the risk if each data group were to be compromised.This is a combination of the probability of a data breach occurring plus the impact of that data breach. Assigning a score to each of these considerations will let you decide how much to invest in keeping that data secure.

Brennan IT’s COO, Dayle Wilson, says there are four key elements you should examine to ensure you are getting security right:

  1. Compliance framework

Cloud providers gain security credibility through certifying their platforms on to compliance frameworks and industry-based compliance standards. If you comply with these standards you will receive a higher quality of service, diminishing the likelihood of that provider being successfully breached. Businesses that value their data and intend to shift to the cloud need to make sure that the chosen cloud provider is certified with the appropriate framework for the data.

  1. Data regulation

Different types of data are subject to different regulations. For example, NFPs who turn over more than $3million annually will now be subject to the change in the Privacy Act, making it mandatory to publicly notify the Office of the Australian Information of Commissioner any data breach.This opens organisations with sensitive data up to a level of transparency that they have not yet had to manage.

  1. Data classification

Some data is classified according to its content, like health records, and there can be different levels of classification assigned to this data, such as cabinet in confidence, protected, highly-protected and so on. It’s essential to ensure your organisation’s preferred cloud solution complies with that data classification level and protects it accordingly.

  1. The importance of protecting outbound traffic

Currently, industry discussions around security usually focus on the importance of inbound perimeter protection and intrusion detection: keeping the cybercriminals outside the network.

However, in most networks, hackers will always find a chink in the armour, no matter how small. A more mature security policy is to recognise this inbound threat and adopt a security posture of containment.

Containment means it’s essential to control the damage once a cyber adversary has breached the perimeter. Specifically, the security measures should prevent the attacker from going back outside the network to download malware or ransomware. Downloading their payload requires the hackers to communicate outbound from the network. Preventing this is what keeps the network safe.

There are technologies and solutions that can block the outbound communication effectively but IT managers are often reluctant to use these as they can impact on the user experience, attracting complaints from employees because they can’t access their social networking sites, for example.

Wilson says the best way to protect outbound communications is via a transparent proxy server. This isn’t automatically provided as part of a cloud solution, as it can be difficult to set-up, so IT decision-makers often don’t purchase one.

Too many IT managers are misunderstanding the risk of outbound communications and failing to implement this simple, yet effective measure. By doing so, IT managers can effectively secure their organisations’ data whether it lives in the cloud or on-premise.

Data security should be considered with every change or update made to your organisations IT environment, a trusted partner can help to bridge any security gaps in your network.

Brennan IT has been catering to the specific technology needs of Australian NFPs for many years, and our team of specialist engineers are immediately on hand to discuss how can help you to help others.

Visit here or contact us on 1300 500 000.



FEATURED SUPPLIERS


Helping the helpers fund their mission…...

FrontStream Pty Ltd (FrontStream AsiaPacific)

Yes we’re lawyers, but we do a lot more....

Moores

HLB Mann Judd is a specialist Accounting and Advisory firm t...

HLB Mann Judd

...


More Suppliers

Get more stories like this

FREE SOCIAL
SECTOR NEWS

YOU MAY ALSO LIKE

Not for Profits Warned on Privacy and Data Security

Staff Reporter

Tuesday, 13th March 2012 at 9:27 am

POPULAR

Red Cross Moves to Wage-Based Fundraising Model

Lina Caneva

Thursday, 16th November 2017 at 8:30 am

Disability Advocacy Group Fights to Restore State Funding

Luke Michael

Thursday, 9th November 2017 at 8:37 am

New Same-Sex Marriage Bill Looks to Protect Faith-Based Charities

Luke Michael

Monday, 13th November 2017 at 5:25 pm

Concerns Raised Over New ACNC Board Appointments

Luke Michael

Monday, 20th November 2017 at 2:28 pm

Write a Reply or Comment

Your email address will not be published. Required fields are marked *


Good 360
pba inverse logo
Subscribe Twitter Facebook

Get the social sector's most essential news coverage. Delivered free to your inbox every Tuesday and Thursday morning.

You have Successfully Subscribed!