The 7 Types Of Data Security That Matter

The 7 Types Of Data Security That Matter

With the huge wave of cyberattacks sweeping South Africa today, there’s hardly a single business owner who doesn’t recognise the importance of data security. But knowing that something is necessary and knowing how to implement it are two different things.

In this article, we cut through the sea of information on cybercrime and identify the 7 types of data security that will have the biggest impact on your company’s online safety.

Here are the factors that make the biggest difference and how you can make sure you are covered on each one.

Access Control

Going to sleep with the front door open is an invitation to criminals, and yet that’s exactly what many businesses do every day by failing to secure access to their data.

Strong passwords, firewalls, anti-malware, software, and secure cloud storage are all measures you can take to ensure that only authorised users have access to your company’s information.

Authentication

Once the front door of your company’s data is locked, you need to verify the identity of anyone who knocks on it and wants to come in.

User authentication, preferably using multiple factors to avoid impersonation crimes, is a crucial step to take in order to protect your data from online intruders.

Disaster Recovery and Backups

No matter what steps you take to protect your data, the sheer number of cyberattacks affecting South African businesses today proves yet again that cybercrime can and will happen.

If the worst case scenario comes to pass and your company becomes the victim of a cyberattack, the best response you can mount is to close off access to your data and have a clean copy of all your files for easy restoration.

Encrypted backup and secure cloud storage are the gold standard when it comes to the strategy and our range of packages for businesses of all sizes are the ideal way to get started.

Data Resiliency

Should a cyberattack occur, you need to know that you have access to your data no matter what. There are many strategies you can use to achieve this, but one of the more popular ones is the 321 method.

You should have three copies of every file: two on separate media, and the final one in the cloud.

An encrypted backup solution that syncs with your cloud-based apps and devices is the ideal way to track multiple versions of this data and ensure that they’re all updated.

Data Masking

When you share information with people outside your organisation, it’s essential to mask your data so that it can’t be used by cybercriminals.

This includes stamping any digital versions of your company documents and logos with a ”sample” watermark and never using your real data when making presentations at conferences or posting online.

Even innocent-seeming company information can be used by cybercriminals to find out crucial information about your business and plan an attack.

Data Erasure

When you stop using any device, even a wi-fi router, the first thing to do is wipe the bar drive and other storage so that your files are permanently removed – but there’s a better way to do this than normal formatting.

Data erasure removes files and rearranges the code that was used to store them so that no trace of the original file can be found and used by cybercriminals to piece together your data.

Encryption

When it comes to storage, you’ll want to ensure that all your files are encrypted, so that only you and authorised members of your company can access them.

Our range of secure cloud storage solutions feature encrypted data management and immutable coding for added security.

Keeping your data safe is far easier when you know what factors to consider. By covering the bases above, you’ll be in a stronger position to avoid and respond quickly to potential cyberattacks.

AI-Based Algorithm from Wits Tracks Chances of a COVID-19 Third Wave in SA

As a service provider of online cloud backup, we often focus our attention on topics related to data. In this article, we would like to give a shoutout to a team that has developed an early detection system that helps to predict future cases of COVID-19.

Enter the spotlight; our very own Wits University as a frontrunner for developing an Artificial Intelligence-based (AI-based) algorithm that has helped to predict the severity/chances of a third wave of COVID-19 South Africa. While the statistics predict that the chances are low, the country is still vulnerable and it’s important that we all continue to do our bit to follow all the necessary COVID protocol and regulations.

The system was developed by Wits University in partnership with iThemba LABS (a leading research facility for accelerator-based science), the Gauteng Provincial Government, and Canada’s York University.

We take a look into the AI-based algorithm and exactly what it seeks to achieve.

what is the functionality of the new AI-based algorithm?

The AI-Based algorithm functions as an early detection warning system. It predicts daily cases in the future based on historical data from past infection rates across the country. While the algorithm works independently, there is another algorithm that is also referenced. The existing algorithm currently used by the SA government is based on classic analytics, and when run at the same time as the Wits University algorithm, more reliability is added to the process and outcomes.

Each algorithm works independently, navigating a large number of parameters, dimensions and analysing complex problems while continuously learning from the data.

what’s the benefit of another detection system?

The general public and the health care industry need to know beyond reasonable doubt that they can rely on the systems in place. With two detection systems running simultaneously and updated daily, the results are more reliable. Should the systems show a discrepancy, it provides a red flag worth further investigation.

The rise and fall of COVID-19 is still very much an unknown entity but it’s evident that infection waves are hard to predict or control. An AI-based algorithm provides a warning signal to policymakers and the population in South Africa.

The system monitors daily data, and when it notices a change that may indicate a new wave or greater threat, it issues an alert to the relevant decision-makers and authorities.

are AI algorithms accurate?

It needs to be noted that predictions by algorithms can be accurate, but there is never 100% guaranteed accuracy. It is better to use the system to predict outcomes over the short term (a few weeks at a time) than over the long term (say, a year), as the longer the prediction period, the less accurate the predictions stand to be.

It’s undeniable that such systems provide a valuable service, especially when quick and decisive action needs to be taken

last word

Thanks to the enthusiasm and commitment of local students at the University you can follow these predictions for each of our provinces on the 3rd wave risk index dashboard. The orange line seen in the graphs indicates a possible risk for an onset of a new wave in the respective province.

A big shout out to Wits University and all their co-collaborators! Well done!

Protecting Your Data – Cloud Backup, Cloud Storage, or Cloud Sync?

We all know that we need to protect our data from breaches and hacking attacks, but are we fully aware of the options and what do they even mean? There are so many ‘cloud’ buzzwords attached to data protection, from storage to sync to backup, that you’d be forgiven for not knowing the difference.

Types of Cloud Data Protection

You won’t know which route is right for you until you understand the differences between the various data protection cloud options, and understand what type of user experience you require.

While protection is the shared goal of all three, they can each be summarised by the following:

  • Cloud Backup – saves your data
  • Cloud Storage –  creates a gateway to access information remotely
  • Cloud Sync – is for multiple users, anywhere and as the option implies, syncs any changes across all devices.

We take a look in more detail at the differences between the three main types below:

Cloud Backup

Saving your data to the cloud is known as cloud backup. For many business owners, personal computer and laptop users too, cloud backup is the ideal option as the software can be set up to run the backup automatically, at regular intervals. This means that you don’t have to do a thing once the software is installed and set up.

Cloud backup services that are legitimately reliable will offer data encryption as part of the service. This means that your data will be locked with a password which only you will be able to unlock. When you access your data in the cloud, it should show all versions of the data, including all edits and changes along the way.

If you ever lose your data or something goes wrong with your device, the service provider can give you access to all previous versions of your data. This type of service is typically subscription-based with a monthly or annual fee.  This is one of the safest ways to protect your data.

Cloud Storage

Cloud storage and cloud backup are two very different things. Cloud storage is the process of loading copies of files and images to a cloud-based folder/service. Unlike cloud backup, this service doesn’t do incremental updates. The copy that you save is the copy that you will receive if you ever need to retrieve your files from the cloud.

Simply put, cloud storage is much like using an external hard drive or a flash drive. Initially, cloud storage can be time-consuming as the uploads need to be done manually, but once you have the bulk of the files uploaded, it’s as simple as setting a reminder to upload your saved files regularly.

Cloud storage is ideally suited to users who require flexible storage capacity. Unlike an external drive, cloud storage capacity can be increased simply by increasing your subscription.

Cloud Sync

With the ever-increasing trend of remote working and flexible hours, cloud sync is a ‘lifesaver’ for small to medium-sized businesses and project teams. While it doesn’t offer vast amounts of storage space, it does allow users to upload files from anywhere and enables them to work on a variety of different devices.

Users can share information, update documents and information across all devices, and share data in an instant. As long as a user has internet access, the service can be accessed from anywhere. Cloud sync saves time and money, and space, but is not recommended for large volumes of data that need to be kept safe. This is not a data storage and protection service – it is more of a file sharing and collaboration service.

Last Word

One thing we all know is that data storage is essential for keeping data safe and secure. Both cloud storage and cloud backup are good options for protecting data, ensuring that there is a copy available, should the worst happen. Take the plunge today – make 2020 the year that your data security is taken care of first!