Is your laptop Hole or a Plug? - Synersoft | See How to Backup your Computer
BLACKbox and GMail shaking hands, saving huge costs
August 19, 2017
avoid unforeseen risks to your data
Unseen Assets, Unforeseen Risks…
September 18, 2017

Is your laptop Hole or a Plug?

image
Is your laptop Hole or a Plug?

Laptops are the integral devices to carry or use Intellectual Property, Sensitive Business Information and Digital Assets for an enterprise.

Enterprises use laptops with four perspectives.

  1. A. Anytime Anywhere work by enterprise owners
  2. B. Anytime Anywhere work by senior managers
  3. C. As a pre-configured device, facilitating technical service by service engineer
  4. D. As a pre-configured device facilitating marketing interaction with prospect by sales team.
Let us understand the best practices to use laptops at enterprise level. For simple understanding, I am putting it in a form of questionnaire.
  1. Do you have process to trigger backup of every laptop, at least every day?
  2. Answer must be Yes, Automatic

  3. Do you have process to verify good completion of backup?
  4. Answer must be Yes, Centralized, User Independent

  5. Do you have provision to version the backup so that virus infection or ransomware on
    laptop does not harm you?
  6. Answer must be Yes, backups should be versioned, else, virus or ransomware will make it useless.

  7. Where and how is backup data stored?
  8. Answer must be, on Data Center, Through VPN. Don’t rely on users to save data manually on Google Drives or Dropbox. They may and
    may not.

  9. Can user access backup?
  10. Answer must be No. If user can access backup, she / he can delete it also. Data backed up on Google Drives or Dropbox can be
    wiped out by user himself.

  11. How do you segregate enterprise data and personal dataon laptop for backup process?
  12. Answer must be, user is given mutually exclusive drives for enterprise and personal usage. These drives cannot be accessed
    simultaneously. Backup is triggered only for enterprise drive.

  13. How do you prevent or monitor USB usage on laptops to prevent data thef
  14. Answer must be, in place system to block USB port, to restrict one way (from outside to inside and not from inside to
    outside) use of USB ports or to report USB use on laptop

  15. How do you prevent data theft by email from laptop?
  16. Answer must be, in place system to enforce usage of only corporate email system (no personal email system) with email sending
    policies

  17. How do you control Internet access on laptops for information security when they are
    outside of your firewall coverage?
  18. Answer must be, in place system to restrict Internet access natively whether or not, they are connected to enterprise firewall.

  19. Can you prevent laptop user to push data to personal drives or personal email ids?
  20. Answer must be, yes, when enterprise drive is accessed, users have limited access to internet. When full internet is accessed, user
    does not have access to enterprise drive.

Deliberation on above 10 points will decide, whether your laptops are holes or plugs. Try to answer them and you will know your enterprise’s vulnerability quotient.

There are brilliant solutions at very affordable cost to convert your laptops from Holes to Plugs.
Check This

 
Vishal Shah
Founder and CEO,
Synersoft Technologies Pvt Ltd

2 Comments

  1. I’m really impressed with your writing skills as well as with the layout on your
    blog. Is this a paid theme or did you modify it yourself?
    Anyway keep up the nice quality writing, it is rare
    to see a great blog like this one today.

Leave a Reply

Your email address will not be published. Required fields are marked *

Demo

Want to know More?

Ask for Demo





    captcha
    Check

    IT INFRASTRUCTURE AUDIT

    Reality Check Voucher worth INR 20000 NOW FREE

               








      captcha