Bajan Sun Magazine - Caribbean Entrepreneurs Vol1 Issue 5 | Page 39

BAJAN SUN Bajan Sun Magazine JULY 2014 Protecting Data Protecting sensitive data is the end goal of almost all IT security measures. Two strong arguments for protecting sensitive data are to avoid identity theft and to protect privacy. The improper disclosure of sensitive data can also cause harm and embarrassment to students, faculty, and staff, and potentially harm the reputation of the Institute. Therefore, it is to everyone's advantage to ensure that sensitive data is protected. 1. Data security is fundamental Data security is crucial to all academic, medical and business operations at MIT. All existing and new business and data processes should include a data security review to be sure MIT data is safe from loss and secured against unauthorized access. 2. Plan ahead Create a plan to review your data security status and policies and create routine processes to access, handle and store the data safely as well as archive unneeded data. Make sure you and your colleagues know how to respond if you have a data loss or dat a breach incident. 3. Know what data you have The first step to secure computing is knowing what data you have and what levels of protection are required to keep the data both confidential and safe from loss. 4. Scale down the data Keep only the data you need for routine current business, safely archive or destroy older data, and remove it from all computers and other devices (smart phones, laptops, flash drives, external hard disks). 5. Lock up! Physical security is the key to safe and confidential computing. All the passwords in the world won't get your laptop back if the computer itself is stolen. Back up the data to a safe place in the event of loss. 39 www.bajansunonline.com/MAGAZINE/ | [email protected] | @BajanSunOnline Bajan Sun Magazine