Cyber Security - A Look at the Basics (Part 3 of 5)

Back to Blogs
Cyber Security Basics with Microsolve

In the digital world, data is constantly in motion. Whether it's being transmitted over the internet or shared within your organisation, understanding the risks associated with data transmission is crucial. This 3rd installment in our blog series will delve into the best practices for protecting data in transit and the importance of categorising data based on its intended audience.

Part 3 - Transmission and Sharing

Understanding the Risks of Data Transmission

Data transmission is inherently risky, as data can be intercepted or compromised during transit. To mitigate these risks, it's essential to encrypt data in transit. Encryption ensures that even if data is intercepted, it remains unreadable without the decryption key.

Best Practices for Protecting "In Flight" Data
  • Encryption: Use strong encryption protocols to encrypt data during transmission. Ensure that encryption keys are stored securely and regularly rotated.
  • Rights Management: Implement rights management solutions to control access to data during transmission and upon receipt. This ensures that only authorised users in appropriate locations and using appropriate devices can access and modify data.

Do's and Don'ts
  • Do use secure, encrypted communication protocols (such as HTTPS, SFTP, and VPNs) for transmitting sensitive data.
  • Do educate employees on the importance of data protection during transmission.
  • Don't transmit sensitive data over unsecured networks or public Wi-Fi networks.
  • Don't share encryption keys or sensitive information over insecure channels.
  • Don't assume good intentions - it is best to trust no one!

Conceptual image of micro circuit. Security concept

Understanding Data Sharing

Once data is shared, it can no longer be fully protected. It's crucial to categorise data based on its intended audience and sensitivity level. This allows you to apply appropriate security measures and access controls.

Categorisation of Data by Intended Audience
  • Public Data: Data that can be freely shared with the public without compromising security.
  • Internal Data: Data that is only accessible to employees within the organisation.
  • Confidential Data: Data that is highly sensitive and should only be accessed by authorised personnel.

Know Where to Store Data

Different types of data require different storage solutions. Determine the appropriate storage location based on the sensitivity and intended use of the data.

 

Need help with your cyber security?Speak With An Expert


Part 1 - Know Your Business

Part 2 - Storage and Access Controls

Part 4 - Auditing and Reporting

Part 5 - Response and Contingency