Home > A simple approach to protecting your information

Tag: A simple approach to protecting your information

A simple approach to protecting your information: Part 5

In the fifth part of our series on information security, we set out the final step for you to consider: What security measures will contribute to achieving the identified goal? These measures will broadly fall into three categories: paper (policies, procedures, and guidelines), people (roles, responsibilities, and practices), and tech (requirements and implementation).

Read more

A simple approach to protecting your information: Part 4

In the fourth part of our series on information security, we set out the next step for you to consider: What information security goal do you seek to achieve? This might be confidentiality, integrity, availability, or anonymity. You should decide on a primary goal for each of your most valuable and sensitive information assets. You can then implement security measures to achieve this goal.

Read more

A simple approach to protecting your information: Part 3

In the third part of our series on information security, we set out the next step for you to consider: Where should your most valuable and sensitive information be? Information security is difficult. The more locations the information is at and the longer it is there, the greater the chances of compromise and the more resources required to secure it.

Read more

A simple approach to protecting your information: Part 2

In the second part of our series on information security, we set out the next step for you to consider: Where is your most valuable and sensitive information? You have to secure that information everywhere it is located across a wide variety of forms, including paper, digital, and mental. If you are unable to locate this information, then you cannot expect to secure it.

Read more

A simple approach to protecting your information: Part 1

In the first part of our new series on information security, we set out a simple approach to help you archive, back up or destroy a lot of the information that may be causing you concerns. You can then focus your energy (and limited resources) on rolling out appropriate security measures for the most valuable and sensitive information that you work with.

Read more