Cyber Security - A Look at the Basics (Part 2 of 5)

Cyber Security Basics with Microsolve

In the world of cyber security, it's crucial to understand data storage. Like a house, your computer network has various rooms to store your things. These rooms can be file servers, OneDrive, Dropbox, Box, Sharefile, etc.

But the most important thing? Know where you have data stored. It's just like remembering which room you put your toys in.

Part 2 - Storage and Access Controls

Understanding Data Storage

Let's consider a few points:

  • File servers are like the main storage room.
  • OneDrive, Dropbox, Box, and Sharefile are like different cupboards, each with its lock and key.
  • Always ensure you know where your important files (your precious toys) are stored.

Technician walking in hallway of server room


The Principle of Least Privilege

The principle of least privilege in cyber security is like deciding who can go into which rooms in your house. It means giving people the least access they need to do their jobs.

For example:

  • The cook needs access to the kitchen but not the children's rooms.
  • The cleaner needs access to all rooms but doesn't need the keys to the safe.

 

Where Malicious Actors Look

When bad guys try to break into your house, they look for signs. Similarly, in the world of cyber security, we have to think about where these hackers or attackers might start looking. Hide the signs and make their job tough.

Here's what you can do:

  • Lock your doors: Keep your data storage systems secure.
  • Don't show off your keys: Don't share your passwords or access controls.
  • Don't tell strangers about your house's layout: Never disclose where your sensitive data is stored.

Remember, keeping your data safe is like keeping your house safe. Know where you store your data, who has access, and where the bad guys might look. Stay smart, stay safe.

 

Need help with your cyber security?Speak With An Expert


Part 1 - Know Your Business

Part 3 - Transmission and Sharing

Part 4 - Auditing and Reporting

Part 5 - Response and Contingency