Navigation


BlackBag Data


Upgrades / Updates


Drive Data Destruction


Data Recovery


Information Security

Information Security

line.png

Data confidentiality means that data should only be available to those with authorized access. In your organization, employees should have access only to the data and assets they need to do their job.

It’s crucial for modern businesses to understand the role of information security, its components, and what standards should be in place so that they can put themselves in a position to effectively ensure their data is secured.

BlackBag Data’s approach to security is from the basic, simplistic beginning of a company assessment to provide guidance on where your company should be focused. Much of the basic information security aspects can be implemented easily and without huge costs. Once those basics are deployed, then your company can determine if further, more advanced protocols need to be established.

<aside> <img src="/icons/laptop_gray.svg" alt="/icons/laptop_gray.svg" width="40px" /> Computer / Device Updates

Install updates as soon as possible to protect your computer, phone, or other digital device against attackers who would take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available

</aside>

<aside> <img src="/icons/wall_gray.svg" alt="/icons/wall_gray.svg" width="40px" /> Firewalls and Anti-Malware Software

Firewalls are programs that protect your private network from being accessed by unauthorized users. Anti-malware software offers defense against the malware that may make it through the firewall and other security measures

</aside>

<aside> <img src="/icons/lock-keyhole_gray.svg" alt="/icons/lock-keyhole_gray.svg" width="40px" /> Identity & Access Management (IAM)

Access to company computers and data should be controlled. Employees shouldn’t have access to data they don’t need. Each employee should have a separate user account and only have the privileges they require

</aside>

<aside> <img src="/icons/phone_gray.svg" alt="/icons/phone_gray.svg" width="40px" /> Mobile Device Action Plan

People often use their mobile devices to access work resources. Mobile phones often connect to public networks, potentially exposing the device’s data. Downloading malicious apps or opening spam or texts can also allow hackers to steal sensitive data

</aside>

<aside> <img src="/icons/ambulance_gray.svg" alt="/icons/ambulance_gray.svg" width="40px" /> Incident Response Plan

In the event of an attack, an incident response plan is critical in resolving the issue before it gets worse. This internal incident response plan should contain guidelines on how to detect, respond to and recover from any data breach or network security issue

</aside>

<aside> <img src="/icons/swap-vertically_gray.svg" alt="/icons/swap-vertically_gray.svg" width="40px" /> Data Backup

Data backup is critical to protect your business as the biggest business danger is data loss. Protect your business from fire, theft and cyber crime. All businesses should make regular backups of their critical data. Think of it as insurance against data loss

</aside>

<aside> <img src="/icons/card_gray.svg" alt="/icons/card_gray.svg" width="40px" /> Protect Your Online Identity

Popular business online services like Face­book, Linked­In, Google and Drop­box have been involved in several data breaches. Losing personal information stored on these accounts or being locked out from your account can have unwelcome consequences

</aside>

<aside> <img src="/icons/book_gray.svg" alt="/icons/book_gray.svg" width="40px" /> Security Principles Training

Employees need to be aware of the part they play in keeping the company’s data safe and secure. Educate your employees on the best ways to protect customer information and business data. Basic security practices include strong passwords and careful internet usage

</aside>

Screenshot 2023-08-28 at 8.06.56 PM.png