{"id":6281,"date":"2016-01-26T11:02:13","date_gmt":"2016-01-26T11:02:13","guid":{"rendered":"https:\/\/www.highspeedtraining.co.uk\/hub\/?p=6281"},"modified":"2024-05-17T13:48:17","modified_gmt":"2024-05-17T12:48:17","slug":"data-protection-methods","status":"publish","type":"post","link":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/","title":{"rendered":"Quick Guide to Selecting Suitable Data Protection Methods"},"content":{"rendered":"<p style=\"text-align: left;\"><strong>This guide has been formulated to help SMEs select offline and online measures to protect their data.\u00a0<\/strong><\/p>\n<hr \/>\n<h2>Choosing Offline Data Protection Methods<\/h2>\n<p>It isn\u2019t just the internet that contains data &#8212; your physical office has hoards of confidential materials too. All businesses need measures in place to keep this information confidential because it&#8217;s a\u00a0<a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-act-summary\/\" target=\"_blank\" rel=\"noopener noreferrer\">legal duty<\/a> to prevent data falling into the hands of people who would abuse or share it.<\/p>\n<h4>Here are 12 offline measures to keep your physical data secure:<\/h4>\n<ol>\n<li>Lock rooms containing confidential information when not in use.<\/li>\n<li>Make sure employees don&#8217;t write their passwords down.<\/li>\n<li>Use swipe cards or keypads to access the office.<\/li>\n<li>Use CCTV cameras to monitor your office space.<\/li>\n<li>Shield keyboards when inputting passwords.<\/li>\n<li>Shred confidential waste.<\/li>\n<li>Use forensic property marking equipment and spray systems to mark assets.<\/li>\n<li>Use anti-climb paint on exterior walls and drains.<\/li>\n<li>Install an alarm system.<\/li>\n<li>Place bars on ground floor windows.<\/li>\n<li>Hide valuable equipment from view when not in the office.<\/li>\n<li>Assign a limited number of trustworthy employees as key safe holders.<\/li>\n<\/ol>\n<div class=\"tip__box\">\n<div class=\"tip__title__container\">\n<div class=\"tip__title__text\">\n<div class=\"tip__title__icon\"><img decoding=\"async\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2019\/11\/expert-tip-icon.png\" alt=\"expert icon\" \/><\/div>\n<h3>Need a Training Course?<\/h3>\n<\/div>\n<\/div>\n<p>Our <a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/data-protection-course\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Protection Training<\/a> explains what your responsibilities are under data protection law so that you understand how to collect data legally, obtain consent where required, process data in accordance with the law and ensure data security.<\/p>\n<\/div>\n<hr \/>\n<h2>Picking Online Data Protection Measures<\/h2>\n<p>Online data protection measures are essential. A data leak can irreversibly damage your brand\u2019s credibility and trustworthiness, as well as result in your business facing legal consequences.<\/p>\n<h3>Therefore, you should consider using the following data protection measures:<\/h3>\n<p><strong>Use a cyber shredder<\/strong> (otherwise known as data wiping software). In the same way that you&#8217;d shred confidential data rather than dumping it in the bin, you should use a cyber shredder as part of your online security. Data wiping software\u00a0keeps your information secure by overwriting it with nonsensical binary code. This is crucial for securely destroying digital data because sending files to your computer&#8217;s recycling bin does not completely erase them &#8212; they are still recoverable. If your equipment was ever lost or stolen, any data you deleted through the recycling bin would still be retrievable. Data wiping software, however, destroys it for good.<\/p>\n<p><strong>Encrypt your data.<\/strong> Data encryption makes your sensitive and confidential information unreadable. This protects against data leaks if your devices are stolen. Encryption turns data into &#8216;ciphertext&#8217; so that only authorised users can access the original.<\/p>\n<p><strong>Use firewalls<\/strong> to protect your systems from malware. A firewall is a cyber barrier that prevents your computer from external and network-based threats, particularly malware. Malware is an umbrella term that describes any malicious software, such as computer viruses, <a href=\"https:\/\/usa.kaspersky.com\/internet-security-center\/threats\/trojans#.WNE66PnyiUk\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan horses<\/a>, spyware, adware, and worms.<\/p>\n<p><strong>Use IP security<\/strong> to protect your data from hackers as it travels between networks. IP security ensures private and secure internet communications, so no one can view the data you send and receive.<\/p>\n<p><strong>Limit user privileges<\/strong> on corporate computers. This prevents users from downloading potentially harmful software.<\/p>\n<p>These are only a few protection methods, but they&#8217;re all easy to implement in your business. If you want to continue learning about data protection for businesses, check out our other\u00a0<a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/tag\/data-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">data protection articles<\/a>.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15960\" src=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2016\/01\/cheap-data-protection-methods.jpg\" alt=\"Image shows a waste bin with shredded paper in\" width=\"685\" height=\"295\" \/><\/h3>\n<hr \/>\n<h3>Further Resources:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-act-summary\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Protection Act Summary<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-licence-application\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Apply for a Data Protection Licence<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/common-cyber-attacks\/\">What are the Most Common Types of Cyber Attack?<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-in-schools\/\">Data Protection in Schools \u2013 Guidance for the Education Sector<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-quiz\/\">Data Protection Quiz<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/gdpr-guide-to-the-key-changes\/\">GDPR: A Guide to the Key Changes<\/a><\/li>\n<li><a href=\"https:\/\/www.highspeedtraining.co.uk\/courses\/business-essentials\/data-protection-course\/\" target=\"_blank\" rel=\"noopener noreferrer\">Online Data Protection Training Course<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.<\/p>\n","protected":false},"author":13,"featured_media":29208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[3386,68],"class_list":["post-6281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","tag-data-protection","tag-financial"],"acf":{"schema_disabled":false,"schema_properties_FAQPage_question_answer":null,"schema_properties_HowTo_howto_tools":null,"schema_properties_HowTo_howto_supplies":null,"schema_properties_HowTo_howto_steps":null,"schema_properties_WebPage_cssSelector":null,"schema_sameAs_repeater":null,"schema_custom_json_repeater":null,"schema_custom_json_override":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.5 (Yoast SEO v19.12) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Quick Guide to Selecting Suitable Data Protection Methods<\/title>\n<meta name=\"description\" content=\"What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Guide to Selecting Suitable Data Protection Methods\" \/>\n<meta property=\"og:description\" content=\"What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"The Hub | High Speed Training\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/highspeedtraining\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-26T11:02:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-17T12:48:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2016\/01\/Quick-Guide-to-Selecting-Suitable-Data-Protection-Methods-compressed-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hannah Spruce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hst\" \/>\n<meta name=\"twitter:site\" content=\"@hst\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hannah Spruce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Quick Guide to Selecting Suitable Data Protection Methods","description":"What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/","og_locale":"en_GB","og_type":"article","og_title":"Quick Guide to Selecting Suitable Data Protection Methods","og_description":"What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.","og_url":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/","og_site_name":"The Hub | High Speed Training","article_publisher":"http:\/\/www.facebook.com\/highspeedtraining\/","article_published_time":"2016-01-26T11:02:13+00:00","article_modified_time":"2024-05-17T12:48:17+00:00","og_image":[{"width":2100,"height":650,"url":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2016\/01\/Quick-Guide-to-Selecting-Suitable-Data-Protection-Methods-compressed-1.jpg","type":"image\/jpeg"}],"author":"Hannah Spruce","twitter_card":"summary_large_image","twitter_creator":"@hst","twitter_site":"@hst","twitter_misc":{"Written by":"Hannah Spruce","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/#article","isPartOf":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/"},"author":{"name":"Hannah Spruce","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/4a185f05db1567273266618e6bdf08e1"},"headline":"Quick Guide to Selecting Suitable Data Protection Methods","datePublished":"2016-01-26T11:02:13+00:00","dateModified":"2024-05-17T12:48:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/"},"wordCount":586,"commentCount":8,"publisher":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization"},"keywords":["Data Protection","Financial"],"articleSection":["Business"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/","name":"A Quick Guide to Selecting Suitable Data Protection Methods","isPartOf":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#website"},"datePublished":"2016-01-26T11:02:13+00:00","dateModified":"2024-05-17T12:48:17+00:00","description":"What data protection methods are most suitable for your small business? Our quick checklist will help you uncover what you need to stay protected.","breadcrumb":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/data-protection-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.highspeedtraining.co.uk\/hub\/"},{"@type":"ListItem","position":2,"name":"Quick Guide to Selecting Suitable Data Protection Methods"}]},{"@type":"WebSite","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#website","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/","name":"The Hub | High Speed Training","description":"Welcome to the Hub, the company blog from High Speed Training.","publisher":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.highspeedtraining.co.uk\/hub\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#organization","name":"The Hub | High Speed Training","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/logo\/image\/","url":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/05\/HST_Logo_Dark-Blue_CMYK_AW-scaled.jpg","contentUrl":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-content\/uploads\/2021\/05\/HST_Logo_Dark-Blue_CMYK_AW-scaled.jpg","width":2560,"height":1206,"caption":"The Hub | High Speed Training"},"image":{"@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/highspeedtraining\/","https:\/\/twitter.com\/hst"]},{"@type":"Person","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/4a185f05db1567273266618e6bdf08e1","name":"Hannah Spruce","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.highspeedtraining.co.uk\/hub\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/81b4a12786dafafbeb14d2658e803864?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81b4a12786dafafbeb14d2658e803864?s=96&d=mm&r=g","caption":"Hannah Spruce"},"description":"Hannah began writing for the Hub in 2015 and specialises in HR and social issues. She produces practical resources for employers on topics like promotions, disciplinaries, and interviewing.","sameAs":["https:\/\/www.highspeedtraining.co.uk"],"url":"https:\/\/www.highspeedtraining.co.uk\/hub\/author\/hannah\/"}]}},"_links":{"self":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/6281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/comments?post=6281"}],"version-history":[{"count":9,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/6281\/revisions"}],"predecessor-version":[{"id":75109,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/posts\/6281\/revisions\/75109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/media\/29208"}],"wp:attachment":[{"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/media?parent=6281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/categories?post=6281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.highspeedtraining.co.uk\/hub\/wp-json\/wp\/v2\/tags?post=6281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}