Ask any business owner – they will tell you their time is their most precious asset. With that said, we all want to spend as little time as possible worrying about security and more time on tasks we actually want to do. On the other hand, spending too little time on security can lead to disastrous outcomes. Therefore, we really must aim to yield a greater 'ROI' on the time we spend on security.
1. What is most confidential to you in terms of your business data?
2. Is there anything you cannot afford to lose?
3. Is any of your data irreplaceable?
4. What would cause the most damage to your business?
5. How would a security breach affect your reputation?
6. How would you deal with the financial consequences caused by any of the above?
Imagine somebody stole, destroyed or encrypted your files so you could no longer use them...
Or a criminal were to get their mitts on them...
How would you react to seeing your files suddenly appear online for the whole world to see?
Now look at your list again – how valuable are your assets with a second glance?
Each item on this list is 'as precious an asset' as the time you spend on security.
These are the things you truly value most.
Use this list to focus your energy when applying security and you will halve the time you spend on it.
Consider carefully the value of what you could lose: the cost of recovering what has been lost and the financial implications of losing information about others.
One perspective could be that there is not much point in spending hours backing up files that can easily be replaced when energies are better placed preserving data that truly matters.
On the other hand, a counter-argument could be that all data is sensitive and mission critical – nowadays, systems like Datto are so reliable, cost effective and easy to use that it in fact protects everything and actually costs more to review what you are storing. Having the ability to recover your data quickly will enable you to carry on your activities and processes - more or less without interruption. Have you considered the legal implications of having your systems compromised? What will your customers do knowing their personal information might have been stolen?
What do you think?
Security
Technology is evolving quicker than most peoples’ ability to understand it; therefore it is increasi
You should now understand the difference between Privacy, Anonymity and Pseudonymity. which should l
What business owners consider to be valuable assets will vary from one business owner to another bu
It is critical to know who your enemy is. ‘Better the devil you know’ as they say. If you have never