skip to Main Content
PROTECTING YOUR DIGITAL GOLDEN EGG

PROTECTING YOUR DIGITAL GOLDEN EGG

PROTECTING YOUR DIGITAL GOLDEN EGG

Maybe the recent hack of Yahoo! has made you change your mind about how you incorporate security at your place of business. Maybe you have known security is important all along, but there was no financial way you could implement it how you really need to.

The question we hear again and again as consultants, “How can I possibly protect everything?”

It’s true, the data is everywhere. It’s the blood of your company, while the people act as the organs. Emails, databases, code, customer info, employee info, proprietary data, intellectual property, log in credentials, financial records, and so forth. It’s all there. On the computer. Floating around mystically in internet space.

“How can I possibly protect everything?”

The short answer is: layered security
Let us explain. When you own a home, what are you doing to protect it? Think of what you do when you’re on vacation. Do you lock the doors? That’s the same thing as keeping current on patching. Do you tell at least one person you trust that you’ll be gone so they will check your mail and keep an eye on your house? That’s the same methodology as keeping your website up to date. Do you use an alarm system so that you know the second someone breaks in? In the virtual world, it translates to using an IDS (Intrusion Detection System). Do you display the alarm company’s sign somewhere for outsiders to see? That’s like an IPS (Intrusion Prevention System).

If we’re honest about our business, and we think of all the money that goes out of our company from fiscal year to fiscal year…sometimes, it’s just not feasible. Maybe you can’t hire a whole security team, and security has become the task of your IT department. Maybe you can’t afford a whole monitoring system. We get it. Whenever we come to this conclusion, layered security can still be an option if we use the golden egg theory.

The golden egg is the one type of data in your company that could ultimately ruin it if it were to be leaked. Perhaps, it’s the proprietary blue prints that you built your business from the ground up on. Maybe you handle private customer data that acts as the core of your services. Whatever you decide is your golden egg, that’s what you protect first. From there, you can figure out exactly which security path makes the most sense for you.

If you have questions about how to protect your golden egg, we’re here to help.

Back To Top