ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

WAYS TO PREVENT DATA LOSS, THEFT AND DATA LEAKAGE FROM YOUR LAPTOP AND OTHER PORTABLE DEVICES

Updated on February 21, 2015

WHY MUST I PROTECT MY DATA FROM BEING STOLEN?

In this digitalized age, where almost everything has been reduced to zeros and ones (0s & 1s), the success of all ventures largely depend on its ability to gather data and process such data into information that will be used to make calculated and informed economic decision. If multinationals can maintain their financials by simply dealing on information, then, information/data protection is worth every amount of resources invested into protecting them. Please do not mistake data and information for garbage.

Laptops and other portable devices has proved to be among the most vulnerable computer devices as far as data loss and data leakages are concern, protect them, you will be fine, lose control of them, you may be in for it. In this hub are 10 simple ways to prevent data theft, data loss and data leakage.

 

10 WAYS TO PREVENT DATA THEFT, DATA LOSS AND DATA LEAKAGE

  • Encrypting your data/ data encryption; encryption is the process of turning plaintext into cipher text. What this simply means is to code information or data in a form that cannot be understood by people without the right combination of information and tools to decode the encoded data. Decryption is the term used to describe the process of converting cipher-text into plaintext, i.e. converting a massage into its readable format. The field of cryptography is so complex that it can fill many volumes of encyclopedia; hence, I will not bother to go into a detailed discussion of cryptography. Buy this Amazon book titled; principles of information security, written by Michael and Herbert and move straight to chapter 8 of the book for a reasonable account of encryption and decryption. Or, you can buy the other books with specific titles
  • Education; one best way of preventing data theft, data loss and data leakage is to constantly educate yourself on the latest tricks that data thieves came up with. Learn about social engineering as this is the most common method of compromising your data. Social engineering is the phrase used to explain the non-technical activities of scammers, hackers and other information and data thieves. Keep reading hubs like this and those you will find at the end of this hub to be constantly informed.

  • Storing systems and other devices that contain data in room built with copper; storing your primary storage device in a room built with copper can help block sniffers that read information from your systems. It does not matter whether the system is on or off. These soft-wares collect information from our supposedly strong room. This also is an aspect of computer forensics that cannot possibly be covered well in a hub like this. So do yourself a favour by buying this Amazon book on the right of this section of this hub and get more about this subject matter.
  • Scanning your system for malicious code; it is a crime to run a computer system without strong, updated security software. Always scan your systems (laptops, desktops, ipod, ipad, flash-drive etc) an antivirus, antispyware, anti-adware, anti-spamming, etc softwares. PLEASE NOTE THAT I SAID STRONG AND UPDATED SECURITY SOFTWARES. It will be a waste of time to install the most powerful security software on your system when they are in fact out of date. Malicious programmers work round the clock to make sure that your data are stolen, so you need to keep up with the beat.
  • Being skeptical; be friend to all but trust none. Never trust an email simply because it claimed to be coming from a trusted source. Do your best to verify the source of every mail that comes your way.
  • Physically safe guarding your systems; jealously guard your systems. Don’t allow people to easily access your computer systems; else, they may expose your data to unwanted dangers. Keep your valuable data under lock and keys at all times. Make sure that nobody is watching you while you are inputting your personal data into the system, these include; your password, PIN(personal identification number),etc
  • Properly deleting your information/ data from your hard disc before disposing; a lot of people make the mistake of disposing off their used computer systems without properly deleting all the information in it. Is not enough to format your computer system, as there are softwares that can recover bit streams of information from a formatted hard-disc. Use some third party tools to completely delete information/ data from your computer.
  • Taking advantage of security technology; technologies like: firewall, IDS, access control and other security tools should be utilized to the fullest. If working on a network, combing these tools with VPN (virtual private network) will be an added advantage.
  • Proper human resource management and staff training; you will be wasting your time and that of those you are dealing with if you don’t train your staff to make the best use out of the available technologies. The best technology and equipment is as good as the person operating it. Train your staff well to get the best out of your quest to prevent data theft, data loss and data leakage.

Please note that the content of this article is not an all encompassing one. A continuous education is the key to preventing data theft, data loss and data leakage. This is necessary due to the fact that hackers, spammers and information thieves are always learning new technology and how to use them negatively. One way of keeping informed and updated is to buy these Amazon books sampled on the right side of this hub.

To the safety of your data and information!

 

 

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)