Protect Your Data

Protect Your Data with These Six Best Practices: Cybersecurity Best Practices

Cimplifi recently continued its “between a rock and a hard place” series with this post to show you how to protect your data with these six best practices!

Their post (Between a Rock and a Hard Place: Six Best Practices You Can Take to Protect Your Data) discusses six best practices that your organization can quickly take to protect its data and (of course) the data of your clients as well. While data protection is an organization wide initiative, there are some best practices your organization can quickly implement to significantly bolster protection of your (and your clients’) sensitive data. Here’s one of those six best practices:

Keep Your Software Up to Date

ProSearch

One of the most common ways that hackers can access your sensitive data is through vulnerabilities that are identified. Those vulnerabilities can occur at any layer of software – from the operating system to the applications your organization uses. And they can be discovered by anybody, including hackers.

One example from last December was the Log4Shell zero-day vulnerability (which had been unnoticed since 2013 until it was discovered) identified in Log4j (which I covered here), which is a Java-based logging utility that is literally found in millions of servers across the world. The patch was issued without much fanfare and many companies were able to apply it before attackers could exploit the vulnerability in their environments.  At least one company, however, was hacked within the mere four-day window before they could apply the patch. It’s important to keep your software up to date and apply any security patches quickly to minimize exposure.

So, what are the other five best practices to protect your data? Find out that and more here! It’s just one more click! And please share any comments you might have or if you’d like to know more about a particular topic.

Disclosure: Cimplifi is an Educational Partner and sponsor of eDiscovery Today

Disclaimer: The views represented herein are exclusively the views of the authors and speakers themselves, and do not necessarily represent the views held by my employer, my partners or my clients. eDiscovery Today is made available solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Today should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Leave a Reply