Request Quote
Make the Most of 2017 with this Security Checklist

Make the Most of 2017 with this Security Checklist

10 January 2017

Enough with the New Year’s resolutions that never seem to stick. Here are some actionable measures you can take right now to secure your business data for 2017.

As information management experts, we recommend an annual review of your information security policy. The number of cyber-attacks and natural disasters rose at an alarming rate in 2016. And as the internet-of-things tends to grow faster than most can keep up with, now is the time to consider where your organisation stands.

Here is a list of six steps to ensure comprehensive data security:

1. Enable a Disaster Recovery (DR) Plan.

If a fire/super-storm/flood occurred, could your business afford to be offline, with a potential loss of access to your data? Most companies find DR to be an incredibly worthwhile business continuity investment, saving money in the long term. Data loss can cost companies upwards of hundreds of thousands of dollars.

If you have an existing DR plan in place, examine the contents to determine any areas that need updates to stay current.


2. Back up data online.

Your company’s most valuable asset is its data. As employees work each day, there should be a backup system saving their work, including all files and correspondence. Outages strike unexpectedly, making preventative measures more cost effective.


3. Archive as needed.

Most companies pay prime money for their office space. Some have whole rooms and areas dedicated to archiving. You can actually save more money by implementing a secure offsite storage system. Reuse the space saved for more workstations…or if our staff had a say, to add in a pool/ping pong/air hockey table.

Quality offsite storage comes with even greater security. Protect with video monitoring and digital system tracking any document movement for your audit trail. This applies to all media – from files to LTO tapes.


4. If you haven’t already, digitise.

Convert your physical documents into digital. This process creates more timely and accurate accessibility.

Restore and preserve your historical documents. Scanning can be one element of document preservation. But now, with smart technologies such as OCR and handwriting detection, you can make the text searchable. Oh, the convenience.


5. Protect intellectual property.

Intellectual property can mean source code for your critical software. You can secure source code with a trusted third party escrow agreement. Your confidential information is stored in a monitored and safe vault with controlled access. Find out more about how this service can be tailored to your business.


6. Prevent cyber-attacks.

Employee governance is the key to implementation of data safeguarding. Your staff must be trained on security policy and procedure. Any updates should be communicated regularly. Read here to understand how insiders can be your biggest risk, and how to combat it.


If you are unsure how these suggestions align with your unique company requirements, speak to an expert to help assess your specific risks and develop a comprehensive plan accordingly. The TIMG Team is available to help you have a secure future for your organisation.


© Copyright 2019, The Information Management Group