{"id":1967,"date":"2022-04-05T00:00:00","date_gmt":"2022-04-05T00:00:00","guid":{"rendered":"https:\/\/cos.p10.sol1.net\/uncategorized\/7-best-practices-and-tips-for-preventing-data-loss\/"},"modified":"2022-07-19T05:01:30","modified_gmt":"2022-07-19T05:01:30","slug":"prevent-data-loss","status":"publish","type":"post","link":"https:\/\/www.cos.net.au\/c\/cospedia\/prevent-data-loss","title":{"rendered":"7 Best Practices and Tips for Preventing Data Loss"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1967\" class=\"elementor elementor-1967\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-143c74a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"143c74a5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57b488a1\" data-id=\"57b488a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42c054d9 elementor-widget elementor-widget-text-editor\" data-id=\"42c054d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW181888788 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\">We are now <\/span><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\">more reliant on data than ever<\/span><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> which means that data security is something that we simply can\u2019t afford to overlook<\/span><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\">. According to <\/span><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\">an<\/span><span class=\"NormalTextRun SCXW181888788 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> IBM report, the average cost of a data breach in 2021 was the highest in its 17-year history, and remote work was the biggest contributing factor. Compromised credentials were the most common breach, accounting for 20 percent and costing an average of USD 4.37 million.<\/span><\/span><\/p><p><span class=\"TextRun SCXW78692230 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW78692230 BCX9\" data-ccp-parastyle=\"Normal (Web)\">In Australia, the average cost of a data breach is $3.35 million per incident. According to the Verizon Data Breach Investigations Report 2021, Australian organisations take an average of 200 days to detect a data breach, which is more than 6 months. According to ConnectWise\u2019s SMB Cybersecurity Report, more than half (51 percent) of small and medium-sized businesses do not have an incident response strategy in place for countering data breaches and cyber-attacks.<\/span><\/span><\/p><p><span class=\"TextRun SCXW7021702 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\">All organisations and individuals, need to improve their security procedures to safeguard their data and prevent data loss. Businesses and individuals <\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\">can<\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> suffer serious consequences if they do not have proper <\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\">data<\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> security procedures in place. While data loss might appear unavoidable, <\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\">taking proactive steps to safeguard your data and prevent a data breach <\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\">can<\/span><span class=\"NormalTextRun SCXW7021702 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> help you save money while protecting your most sensitive information.<\/span><\/span><\/p><h3>Here are 7 best practices and tips for protecting your devices from data loss and cyberattacks.<\/h3><ol><li><strong><span class=\"TextRun SCXW98986730 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW98986730 BCX9\" data-ccp-charstyle=\"Strong\">Backup your data: <\/span><\/span><\/strong><span class=\"TextRun SCXW98986730 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW98986730 BCX9\" data-ccp-parastyle=\"Normal (Web)\">According to World Backup Day, every month 1 in 10 computers <\/span><span class=\"NormalTextRun SCXW98986730 BCX9\" data-ccp-parastyle=\"Normal (Web)\">is<\/span><span class=\"NormalTextRun SCXW98986730 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> infected with viruses and malware and 30 percent of users have never backed up their device. On average, 33 percent of all folders used by a business are open to everyone, according to the Global Data Risk Report by Varonis. Backing up your data is the simplest and most effective technique to protect your data. Essentially, this helps in the creation of a duplicate copy of your data, so that you don\u2019t lose crucial information if a device is lost, stolen, or compromised.<\/span><\/span><\/li><li><span class=\"TextRun SCXW49971146 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW49971146 BCX9\" data-ccp-charstyle=\"Strong\"><strong>Investing in anti-virus and spyware protection:<\/strong>\u202f\u00a0<\/span><\/span><span class=\"TextRun SCXW49971146 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW49971146 BCX9\" data-ccp-parastyle=\"Normal (Web)\">Data loss can be caused by a variety of factors, including human error or physical theft. However, malware was involved in 15 percent of data breaches, according to Verizon&#8217;s Data Breach Investigations Report. Anti-malware protection is essential for setting the groundwork for your devices&#8217; security. Using anti-virus software, running spyware scans on a regular basis, and avoiding clicking on suspicious email links or websites are some of the easiest ways to avoid viruses and malware.<\/span><\/span><\/li><li><strong><span class=\"TextRun SCXW227750472 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-charstyle=\"Strong\">Properly shutting down your system:\u202f <\/span><\/span><\/strong><span class=\"TextRun SCXW227750472 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\">Before shutting down your system, make sure you\u2019ve closed all the running applications and saved your data. Failure to do so can result in data loss as some tasks and programmes <\/span><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\">may continue<\/span><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> operating in the background. Leaving your computer linked to the Internet when it&#8217;s not in use<\/span> <span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\">provides cybercriminals with 24\/7 access to your personal data and <\/span><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\">the <\/span><span class=\"NormalTextRun SCXW227750472 BCX9\" data-ccp-parastyle=\"Normal (Web)\">ability to install malware and commit cybercrimes.<\/span><\/span><span class=\"EOP SCXW227750472 BCX9\" data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><li><strong><span class=\"TextRun SCXW216257799 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW216257799 BCX9\" data-ccp-charstyle=\"Strong\">Secure your wireless network: \u202f<\/span><\/span><\/strong><span class=\"TextRun SCXW216257799 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW216257799 BCX9\" data-ccp-parastyle=\"Normal (Web)\">It&#8217;s usually a good idea to safeguard your wireless network with a password, whether you&#8217;re a business owner or an individual. This prevents unauthorised users from hijacking your wireless network and helps in protecting sensitive information. Always make sure your Wi-Fi network is secure, encrypted, and hidden.<\/span><\/span><\/li><li><strong><span class=\"TextRun SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-charstyle=\"Strong\">Encrypt data on USB or hard drives:\u202f\u00a0<\/span><\/span><\/strong><span class=\"TextRun SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-parastyle=\"Normal (Web)\">If you encrypt sensitive data on portable storage devices, cybercriminals will find it difficult to extract your personal information if your device is lost or stolen.\u202f<\/span><\/span><a class=\"Hyperlink SCXW222306033 BCX9\" href=\"https:\/\/www.cos.net.au\/search?searchTerm=hard%20drive&amp;categories=3715&amp;brands=&amp;symbols=&amp;sortBy=Popularity_ASC\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-charstyle=\"Hyperlink\">Hard drives<\/span><\/span><\/a><span class=\"TextRun SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-parastyle=\"Normal (Web)\">,\u202f\u00a0<\/span><\/span><a class=\"Hyperlink SCXW222306033 BCX9\" href=\"https:\/\/www.cos.net.au\/search?searchTerm=hard%20drive&amp;categories=3790&amp;brands=&amp;symbols=&amp;sortBy=Popularity_ASC\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-charstyle=\"Hyperlink\">USB drives<\/span><\/span><\/a><span class=\"TextRun SCXW222306033 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW222306033 BCX9\" data-ccp-parastyle=\"Normal (Web)\">, and SIM cards are some examples of detachable storage devices that can be linked to another system and have all of your data accessible. Keeping data backups can protect you from ransomware and data destruction.<\/span><\/span><\/li><li><strong>\u00a0Configuring app privacy settings:\u00a0<\/strong>Many applications have data privacy settings, allowing users to select how much and what types of information need to be shared or retained. Always choose the least level of data sharing to ensure that cybercriminals can\u2019t go too far in obtaining your personal information and controlling your devices.<\/li><li><span class=\"TextRun SCXW85778917 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-charstyle=\"Strong\"><strong>Use strong passwords:<\/strong>\u202f\u00a0<\/span><\/span><span class=\"TextRun SCXW85778917 BCX9\" lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-parastyle=\"Normal (Web)\">Make sure networks and accounts that handle sensitive data have password-protected access. Make it a rule to use strong or complex passwords for all accounts by using a variety of characters and <\/span><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-parastyle=\"Normal (Web)\">set them<\/span><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> to expire every 90 days or so. Two-factor authentication is the next <\/span><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-parastyle=\"Normal (Web)\">step<\/span><span class=\"NormalTextRun SCXW85778917 BCX9\" data-ccp-parastyle=\"Normal (Web)\"> in password security, which helps in confirming the identity of someone attempting to get access to sensitive information.<\/span><\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<div class='watch-action'><div class='watch-position align-left'><div class='action-like'><a class='lbg-style3 like-1967 jlk' href='javascript:void(0)' data-task='like' data-post_id='1967' data-nonce='056f4ccaa2' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Did you find this useful?' \/><span class='lc-1967 lc'>0<\/span><\/a><\/div><div class='action-unlike'><a class='unlbg-style3 unlike-1967 jlk' href='javascript:void(0)' data-task='unlike' data-post_id='1967' data-nonce='056f4ccaa2' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.cos.net.au\/c\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='' \/><span class='unlc-1967 unlc'>0<\/span><\/a><\/div> <\/div> <div class='status-1967 status align-left'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>We are now more reliant on data than ever which means that data security is something that we simply can\u2019t afford to overlook.<\/p>\n","protected":false},"author":1,"featured_media":1968,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,2121,8],"tags":[1883,1884,294,1888,1889,1890,1891,2059,2060,258,259,260,261,262,586,587,1892,2061,1893,2062,2063,2064,2065,2066,1903,2067,2068,2069],"class_list":["post-1967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cospedia","category-education","category-productivity","tag-cyberattack","tag-antivirus","tag-computer-data-security","tag-cybercrime","tag-cybercriminals","tag-cybersecurity","tag-cybersecurityawareness","tag-data-breach","tag-data-loss","tag-data-privacy","tag-data-protection","tag-data-regulation","tag-data-security","tag-data-security-threats","tag-data-storage-devices","tag-data-storage-in-cloud","tag-databreach","tag-encrypt-data","tag-malware","tag-portable-storage-devices","tag-prevent-data-loss","tag-privacy-settings","tag-protect-sensitive-information","tag-safeguard-data","tag-secure-data","tag-secure-password","tag-secure-wireless-network","tag-spyware-protection"],"_links":{"self":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/1967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/comments?post=1967"}],"version-history":[{"count":11,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/1967\/revisions"}],"predecessor-version":[{"id":25926,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/posts\/1967\/revisions\/25926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media\/1968"}],"wp:attachment":[{"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/media?parent=1967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/categories?post=1967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cos.net.au\/c\/wp-json\/wp\/v2\/tags?post=1967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}