〈   Governance and cyber risks
Minimum best practices

Chapter 4.3

Technology


  1. Encryption: Encrypt sensitive data at rest and in transit.
  2. Backup: Make regular backups and secure them (3-2-1 rule).
  3. Network security: Secure the network using firewalls, if possible incorporating next-generation features.
  4. Web filtering and email filtering: Use tools to protect and filter emails and internet traffic.
  5. Workstation protection: Protect your workstations and other devices using dedicated security solutions.

Definition: 3-2-1 backup rule

The 3-2-1 backup rule means saving at least 3 copies of your data on 2 different types of media, with at least 1 of those copies stored away from your primary location. This provides maximum protection against data loss in the event of damage to any backup media, including software errors, hardware failures and other damage (fire, loss, etc.).

A next-generation firewall is a type of firewall that uses more advanced technologies to offer increased protection against IT threats. It combines traditional firewall features (such as IP address and port filtering) with advanced techniques such as threat analysis, anomalous behaviour detection, and data loss prevention (DLP).

2023 © Trust Valley. All rights reserved.