Get All Access for $5/mo

6 Useful Ways To Protect Your Data From Leakage The first and the most vital step towards protecting data is regular back up

By Baishali Mukherjee

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur India, an international franchise of Entrepreneur Media.

ymgerman | Shutterstock.com

In an interview with TechRepublic, Limor Kessem, Executive Security Advisor at IBM Security, said, "A lot of personal data is no longer private and consumers are finding it a lot harder to protect themselves when their data is out in the open."

With Facebook admitting that data on most of its 2 billion users is vulnerable, Kessem's claim is now official. Recent media reports also confirmed that a quarter of a billion FB accounts are forged and Russian disinformation operations generated billions of shares. Moreover, on April 11, Facebook CEO Zuckerberg made history testifying before the US Congress about the data leakage.

We cannot deny that the most important thing on our computers is our data that we gather or create. While operating-systems and applications can be easily reinstalled, it is the data which is exclusive and if gone, could result in irreparable loss. Data is often classified and confidential and we do not want others to even see it without approval as revelation of our credit card and bank account info could result in identity theft. Besides, our business documents often include trade secrets, information about our workers or clients and organization's monetary files.

However, with cautious measures and precautions it is now very easy to keep our data safe. Scroll down as experts opine their views about the ways to shield your critical user data from loss and/or unauthorized access-

#1: Back-up is Critical

The first and the most vital step towards protecting data is regular back up. Your frequency of back up will depend on the amount of data can you afford to lose if your system is hacked or if it crashes.

"One can either use backup utility integrated to Windows to carry out basic backup exercises or use Wizard Mode to make the process of creating and restoring backups easier or configure the backup settings manually and set-up automatic backup routines. Many other third-party backup programs offer for more refined options. Irrespective of the program in use, you must store a copy of your backup at some other place in case of natural disasters which can destroy or damage your backup data along with the original one," notified Sushobhan Mukherjee, Chairman of Infosec Foundation and CEO of Prime Infoserv LLP.

#2: Use Permission for Security

To keep your data safe from others, the best step forward is to put in place permissions on the data files and folders. The data present in network shares must have share permissions to manage which accounts can or cannot access the files via the network.

"Share-level permissions are of no use for those using the computer on which the data is kept. Those sharing their systems with others must use file-level permissions. These are set by using the Security tab on the properties section and are much more granular than share-level permissions," informed Mukherjee.

However, in either case, ensure permissions for either user accounts or groups and allow or reject multiple level of access from read-only to full control.

#3: Use Steganography

A steganography program is a great method of hiding data inside another data. For instance, one can conceal a text message within JPG files, MP3 music files, or even within another text file.

According to Saurav Jhawar, Founder, OBO Delivery, a logistics company - steganography does not encrypt messages, hence, it's widely used in combination with encryption software. "The data is first encrypted and then concealed inside another document or file using steganography software. StegoMagic is well known steganography software," he added.

#4: Protect Data in Transit

One with sniffer software can hack your data while it is travelling over the network. In order to save your data while it is in transit apply Internet Protocol Security (IPsec)—however, both the sending as well as the receiving systems must support it.

#5: Secure Wireless Transmissions

Data transmitted over wireless networks is more exposed to interception than the one sent through Ethernet network.

"One does not require direct access to network or device and armed with just a wireless-enabled portable computer and a high gain antenna a hacker can capture data and enter the network to access data provided the wireless access point isn't configured strongly and safely. Data should be stored or sent solely on wireless networks with encryption, if possible with Wi-Fi Protected Access (WPA), as it is tougher than Wired Equivalent Protocol (WEP)," recommended Jhawar.

#6: Use Rights Management to Retain Control

If concerned about protecting data after it leaves the computer, employ Windows Rights Management Services (RMS) to have control over the recipients in their handling of the data. "It is possible to set rights which enable the recipient only to read the document but not change, copy, or save it. Restrictions on forwarding emails can also be put and documents or messages can be made to expire after a specified time-period stopping the recipient from accessing it any further," notified Anuj Dhawan, Founder, Ridenest.

Baishali Mukherjee

Former Freelancer

Starting a Business

He Started a Business That Surpassed $100 Million in Under 3 Years: 'Consistent Revenue Right Out of the Gate'

Ryan Close, founder and CEO of Bartesian, had run a few small businesses on the side — but none of them excited him as much as the idea for a home cocktail machine.

News and Trends

Tech Burner's Anarc Smartwatch Achieves INR 3 Cr Sales with USD 1 Mn Investment

Anarc features a patented octagonal design by Thought Over Design and Seymourpowell, with a medical-grade stainless steel body. It includes advanced technology like a Hisilicon chipset, AMOLED display, and seven-day battery life.

Business Ideas

63 Small Business Ideas to Start in 2024

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2024.

Business Solutions

Get Down to Business with Lifetime Access to Microsoft Office 2021 for Mac for 70% Off

Unlock essential Office tools with a one-time purchase — ideal for entrepreneurs and professionals looking to streamline their workflow.

Business News

'Do You Sell Cars?': Tesla CEO Elon Musk Trolls Jaguar Rebrand on X

The team running Jaguar's X account was working hard on social media this week.

Science & Technology

How AI-Driven Knowledge Can Build a Smarter Culture in Your Organization

AI is changing the way we share knowledge and reducing gaps that hinder collaboration and productivity. Many questions have been raised about the impact full AI integration will have on team culture. For me, it represents empowerment and an opportunity to create a continuous learning environment.