Helping Clients Protect Data from Cyber Threats

Posted on 11-16-2016 by
Tags: Tech2017 , internet , IP , data security , Lexis Practice Advisor , LIT , intellectual property , technology

Cyber criminals are becoming increasingly sophisticated, which means firms, companies and clients must be vigilant in securing data against cyber attacks. Data security Geoff Wold says organizations should implement the following best practices related to data security to improve their cyber resilience posture:

  • Protect data-at-rest, including configurations or rule sets for firewalls, gateways, intrusion detection/prevention systems, filtering routers, and authenticator content.
  • Protect the confidentiality and integrity of transmitted information.
  • Use cryptographic mechanisms to prevent unauthorized disclosure of information and detect changes to information during transmission unless otherwise protected by organization-defined alternative physical safeguards.
  • Consider encryption for data that is sensitive, has a high value, or represents a high value if it is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage.
  • Protect all cryptographic keys against modification, and protect all secret and private keys against unauthorized disclosure.
  • Secure mobile device data. The most prevalent types of mobile device security are laptop security and tracking software and full-disk encryption.
  • Consider using Information Rights Management (IRM), an encryption technology that is typically applied to unstructured data elements such as PDF files and spreadsheets.

For complete details on protecting stored data, data in transit and using encryption techniques, read the complete article on the Lexis practice Advisor Journal website or click here to visit the Lexis Practice Advisor IP & Technology module.

Your comment has been posted.   Close
Thank you, your comment requires moderation so it may take a while to appear.   Close