9-Step Data Security Checklist

By Gary Cox

9Summer is upon us… Time for a stroll in the park…fishing…a few rounds of golf…

Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? A well-designed secure computer network gives you the confidence that “all systems are go,” whether you’re having fun in the sun, or just getting things done with your team.

Here’s a quick nine-step checklist we use to ensure that a company’s computer network, and the data for that business, is safe and secure from disruption, if not absolute devastation.

Data Security Checklist

A written recovery plan

Simply thinking through what needs to happen when things go south, and documenting it all in advance, can go a long way toward getting your network back up and running quickly if it gets hacked, impacted by natural disaster or compromised by human error.

Have a clear communication plan

What if your employees can’t access your office, e-mail or phone system? How will they communicate with you? Make sure your communications plan details every alternative, including multiple ways to stay in touch in the event of a disaster.

Automate your data backups

The #1 cause of data loss is human error. If your backup system depends on a human being always doing something right, it’s a recipe for disaster. Automate your backups wherever possible so they run like clockwork.

Have redundant off-site backups

On-site backups are a good first step, but if they get flooded, burned or hacked along with your server, you’re out of luck. Always maintain a recent copy of your data off-site.

Enable remote network access

Without remote access to your network, you and your staff won’t be able to keep working in the event that you can’t get into your office. To keep your business going, at the very minimum, you need a way for your IT specialist to quickly step in when needed.

System images are critical

Storing your data off-site is a good first step. But if your system is compromised, the software and architecture that handles all that data must be restored for it to be useful. Imaging your server creates a replica of the original, saving you an enormous amount of time and energy in getting your network back in gear, should the need arise. Without it, you risk losing all your preferences, configurations, favorites and more.

Maintain an up-to-date network “blueprint.”

To rebuild all or part of your network, you’ll need a blueprint of the software, data, systems and hardware that comprise your company’s network. An IT professional can create this for you. It could save you a huge amount of time and money in the event your network needs to be restored.

Don’t ignore routine maintenance

While fires, flooding and other natural disasters are always a risk, it’s ever more likely that you’ll have downtime due to a software or hardware glitch or cyber-attack. That’s why it’s critical to keep your network patched, secure and up-to-date. Deteriorating hardware and corrupted software can wipe you out. Replace and update them as needed to steer clear of this threat.

Test, Test, Test!

If you’re going to go to the trouble of setting up a plan, at least make sure it works! An IT professional can check monthly to make sure your systems work properly and your data is secure. After all, the worst time to test your parachute is after you jump out of the plane.

Call us on 072-898-0362 to answer your questions or to provide Computer and IT Support, we would be happy to hear from you. We at GCComp have the experience and technical knowledge to help your business with your technology issues “We know technology so you don’t have to”. 

1 thought on “9-Step Data Security Checklist”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s