Security

Data security: how SMEs protect company data

IT security, information security and data security are three terms to describe the same important task: in times of explosive data growth, SMEs must protect their company- and production-relevant data as well as they can. Read here what you need to be aware of in this context.

04.07.2019
9 minutes 9 minutes
img_keyvisual_post_kw24_DATENSICHERHEIT.jpg
Table of Contents
TODO

IT security, information security and data security are three terms to describe the same important task: in times of explosive data growth, SMEs must protect their company- and production-relevant data as well as they can. Read here what you need to be aware of in this context.

 

Information security

The term information security encompasses all theories and measures for the protection of knowledge. The goal os to ward off threats, avoid damage and minimzie risks. An important area of information securtiy is data security. The topics Big Data and DSGVO-Reform have brought them into the focus of a broad public.

The Varonis Global Data Risk Report 2018 study recently showed that the average cost for a company to repair the damage of a single malware attack is now around $2.4 million. A far better idea is to avoid any risks in good time and invest in technological data security measures. Many companies are doing just that. Total spending by companies on data and information security has risen from $102 billion to $124 billion in the last two years.

Why SMEs should play it safe

‘It is no longer a question of if a company will be attacked, but rather when. Regardless of company size,’ explains Florian Goldenstein, Head of IT Security at Konica Minolta Business Solutions Germany GmbH. ‘Major companies are increasingly well prepared for cyberattacks these days. That is why the focus of cybercriminals is more and more often on small and medium-sized enterprises, SMEs for short’, says the security expert.

On closer inspection, companies are ‘easy prey’. In the study mentioned above, around three quarters of all companies admitted that they administer more than 1,000 outdated sensitive files, which represent a major security risk. 41% of all companies even reported that they have sensitive databases, such as credit card numbers or medical files, that are completely unprotected.

The anticipated growth in data by 2025 is huge

If you look at the predictions of Statista GmbH for annually generated quantities of digital data each year, you can immediately see how important the topic of security is now and will continue to be in future. The data quantity is set to grow from around 33 zettabytes in 2018 to 175 zettabytes in 2025. By way of explanation: one zettabyte of storage space is equivalent to 1,000 exabytes. In figures, that is a one with 21 zeros.

The Data Age 2025 study by IDC and Seagate also assumes a huge growth in data by 2025. Whereas up to now end consumers have provided the majority of the data generated worldwide, the study anticipates a move towards companies in the future. In 2025, the experts expect that companies will generate around 60% of the global data quantity. The study states that through the Internet of Things (IoT) alone, end consumers in 2025 will interact with networked devices 4,800 times a day on average. And all that data needs to be protected.

Data growth requires data protection and data security

In order to securely manage data growth and the resulting amounts of data, two important concepts need to be intertwined: data protection and data security. The two terms are often used interchangeably, but their meanings are somewhat different. Here are the two definitions:

  • The definition of data protection:

Data protection guarantees every citizen the right to informational self-determination and protects against misuse of personal data. The question of whether and which data may be collected and processed is also a matter for data protection.

  • The definition of data security:

Data security refers to technical solutions and organisational data security measures to protect administrative and corporate data. It determines and establishes what measures are taken to protect data. The term information security includes all types of stored information.

more information

Would you like to know more about information security?

Read the Job Wizards article ‘Information security: what’s the latest on international standards like ISO 27001?’ here. Europe-wide experiences with personal data, as well as the effects of and interesting background information on the European General Data Protection Regulation (GDPR) can be found in the articles ‘Taking stock after 100 days: how are things going with GDPR?’ and ‘Six months of the GDPR: three questions for Wojciech Wiewiórowski

Data security defines holistic goals

Whether personal data or data relating to development, production or customers: data security must take into account various aspects to prevent precious company data from becoming an attractive target for hackers or cyberattacks. With this in mind, comprehensive objectives are defined, in order to meet the needs of all these aspects.

The most important objectives of data security are:

  • Preventing data misuse, e.g. through damage, deletion or theft of data
  • Optimal protection against external attacks such as cyberattacks
  • Careful internal protection, regulating access and rights of employees; an important principle is confidentiality
  • Despite secure care, all company data must be accessible and available at all times
  • Of course, the authenticity of the data must also be guaranteed
  • Finally, data security ensures that all data is and remains undamaged (integrity)

Professional concepts and measures for data security are of fundamental importance

Strategically planned concepts and measures for data security consider all these objectives and include a holistic security concept. That is of fundamental importance, because IT experts know from experience that: ‘the more you can do with it, the more they can do to you.’ In other words: if data is of a lot of use to you, it could also be a lot of use to someone else.

Technical IT landscapes and structures are complex these days. Many business workflows are arranged across borders, with data made available and used internationally.

Small and large companies are increasingly adjusting to the new situation, growing and working more and more efficiently. But the new methods of work and production are also making them more vulnerable.

more information

Would you like to know more about strategically planned data security?

Check out the Konica Minolta page focusing on ‘Why strategic security is the only security ’.

Data security measures: are you familiar with these five measures?

An integrated security concept comprises a number of different, efficient measures. These include, but are not limited to, the following five topics that should be considered in terms of security: 

  1. Network or perimeter security

This includes security measures such as a firewall, for example. Firewalls are security systems that protect individual computers or computer networks against undesired network access. This level also includes encryption technology.

  1. End-point security

This includes company-internal password protection, virus protection and anti-spam measures.

  1. Authentication technology

It is also important that all company data is protected by secure access control.

  1. Protection against data loss

Cyberattacks, power cuts, short circuits or fire: there can be many reasons for a surprise loss of data. Protocols and log files can follow up on the reasons for the loss with the help of various backup tools, while backup software ensures that there are secure copies of all data.

  1. Security and data exchange

For the internal as well as external communication and cooperation a secure data exchange is indispensable. 

Good security concepts also consider the human factor

Security threats are not limited to malware and hackers. A comprehensive and professional security concept thus includes training for all employees.

The human factor is also a major weak point: among other things, a lack of security awareness leads to attachments infected with malware being opened or dangerous links being clicked

Florian Goldenstein, Head of IT Security Konica Minolta

Whether they are in purchasing, sales, customer care or development: every employee in a company should understand that data security is a core success factor, especially in times of rapidly increasing company data growth. It is important that everyone is familiar with the data security standards within the company and knows what to do if a security-critical incident does occur.

A transparent IT infrastructure is of fundamental significance

The basic prerequisite for perfectly functioning data security measures is a clear and transparent infrastructure.

The following areas are of central importance for a carefully planned IT infrastructure:

  • Company-own servers / protected data centres
  • Cloud solutions
  • Security / failure protection / system failure protection
  • Risk analysis / protection needs analysis, authorisation management, end-point security solutions, mobile device control
  • Network / network security
more information

Would you like to know more about your company-internal IT infrastructure?

Perform the Job Wizards Readiness Check . In theory, good IT is carefully planned like a beautiful city with central squares and flowing traffic – but in many SMEs the hardware, software and co. form a functional but complex mix. What is the situation in your company? Take an initial inventory with our IT Readiness Checklist.

Data security measures also require a good fire brigade: secure the future with incident response

SMEs are well set up if they are optimally prepared to act as quickly as possible even in the emergency event of a cyberattack. To this end, it is helpful to establish and strengthen strategically planned incident response processes. In the event of an attack, malware can then be discovered faster and the damage that has occurred can be contained.

After an attack, containment and, if necessary, rectification, competent IT security experts are needed for the “lessons learned” phase. Specialists specifically trained for such cases use forensic methods and measures to look for the vulnerable points that got the company into the unfortunate situation in the first place. In addition, they analyse the infected systems to trace the path of the attack. On the basis of this analysis, a strategy is then developed in order to better protect the data against similar attacks in future.

SMEs that regularly carry out random checks on all data security measures and systems stay on the safe side. In this way, valuable data is protected better in the long term and the current security situation in the company can be accurately estimated at any time.

Data #security is increasingly becoming a success factor for companies. Find out how you can comprehensively and proactively secure your #data in times of huge growth in data. #jobwizards https://km.social/3oChtyW

CLICK TO TWEET

 

This may also be interesting for you:

Data security now

Why is data security so important to SMEs? And what does a comprehensive...

Security
28.08.2019

Safe workplace – well-protected, secure working

Whether your new office is at home, you have a conventional office at the...

Security
25.01.2021

Are you confident in the security of your printers?

If your printers could talk, imagine the secrets they could share. Even...

Security
08.06.2023