Unseen Assets, Unforeseen Risks - SYNERSOFT
Secret Spices, We Discovered
July 9, 2019
privacy vs security - data loss prevention solutions
The Un-Affordable Grays of IT
July 22, 2019

Unseen Assets, Unforeseen Risks

Hi There,

Unseen, expresses mystery, uncertainty, fear and risk. And Unforeseen surely damages.

I am writing this blog to help my SME readers to realize their Unseen Assets and associated Unforeseen Risks.

As an enterprise owns tangible assets like land, plant, machinery, office, computers, servers, hardware, equally do they own intangible digital assets, technology, goodwill, knowledge.

In this blog, I attempt to identify these digital assets, associated risks and solution practices.

Here we go,

Your 1st digital asset is your ERP data. It is generated by a single ERP software (like tally, SAP, or homegrown) or by multiple packages (like accounting, inventory, CRM software). Always, such data is in the form of few database files as SQL files or data files. Mostly they are stored on server.

These data files are enterprise’s digital assets, containing

  1. Your Business Model
  2. Your Profitability, Sourcing, Terms of Business Deals
  3. Your Best and Worst Customers and their transactions
  4. Your Financial Profile
  5. Your Key Employees Salary Details
  6. Strategic Trends over a period of time

These data files are subject to serious risk of loss (by deletion), destruction (by disaster) or manipulation (by virus / ransomware). Loss, Destruction, or Manipulation can ruin your business to standstill. Not only this but also, these data files are subject to serious risk of theft or unauthorized access leading to irreversible competitive damage. Theft or unauthorized access can cause quantified business losses against smarter competitors.

Solution Practices

  1. Make sure that your ERP / Software data backup happens automatically.
  2. Make sure that automatic backup happens outside of your premise to provide for disaster. Never push data on cloud over Internet. Always send it through VPN to a tangible data center.
  3. Make sure that your backup is maintained in different versions so you always have a previous version, if Ransomware / Virus strikes.
  4. Make sure that your backup media (harddisk) is not handled by irresponsible employees. Simply they can’t understand the importance of it.
  5. Make sure that server on which these data files are stored, are not loaded with internet, email software or active USB. It makes it very easy to take away data.

Your 2nd digital asset is your Designs, Drawings, Documents, Spreadsheets. It is generated by a Autocad, 3D, Word, Excel, Solidworks kind of software. Always, such data is in the form of dwg, doc, xls, psd, cdr files. They are always scattered on servers, desktops and laptops.

These data files are enterprise’s digital assets, containing

  1. Your Intellectual Property, Designs, Technology
  2. Important Calculations, Correspondence
  3. Your customer’s confidential data for which you might have signed NDA (Non Disclosure Agreement)

These data files are subject to serious risk of loss (by deletion), destruction (by disaster) or manipulation (by virus / ransomware). Loss, Destruction, or Manipulation can ruin your business to standstill. Not only this but also, these data files are subject to serious risk of theft or unauthorized access leading to irreversible competitive damage. Theft or unauthorized access can cause quantified business losses against smarter competitors.

Solution Practices

  1. Make sure that your files are not scattered on devices. Look for Forced Data Centralization solutions from desktop and laptops.
  2. Do not be at Users’ mercy to save data on server, instead do not give them choice to save data anywhere else.
  3. Make sure that your backup is maintained in different versions so you always have a previous version, if Ransomware / Virus strikes.
  4. Make sure that your laptops are backed up every hour. They are used by most important people and contain most important data.
  5. Make sure that automatic backup happens outside of your premise to provide for disaster. Never push data on cloud over Internet. Always send it through VPN to a tangible data center.
  6. Have utmost vigilance on your email systems and sending policies on users.
  7. Install data theft prevention solutions to check data leakage over USB and Internet.

Your 3rd digital asset is your Emails. It is the busiest mode of communication, you do with the world. They are either in your email client (PST files or any) or on cloud (GMail or such). You do commitments, raise disputes, agree, disagree on emails to your vendors, employees, government, competitors and customers.

These data files are enterprise’s digital assets, containing

  1. Communications
  2. Attachments
  3. Addressbooks

These data files are subject to serious risk of loss (by deletion), destruction (by disaster) or manipulation (by virus / ransomware). Loss, Destruction, or Manipulation can ruin your business to standstill. Not only this but also, these data files are subject to serious risk of theft or unauthorized access leading to irreversible competitive damage. Theft or unauthorized access can cause quantified business losses against smarter competitors.

Solution Practices

  1. Make sure that you have incoming and outgoing email backup of every user.
  2. Make sure that you have a local (in-premise) copy of all your emails on cloud (cloud is subject to hacking and you may loose all your emails)
  3. Make sure that you can enforce policies on your email communication to check data theft.
  4. Make sure you can control usage of BCC (Blind Carbon Copy) as it can be sued to steal data
  5. Make sure that all your users do not know email passwords. Understand that passwords saved in outlook files can be easily retrieved.
  6. Do not copy all your in and out emails in single account. it is useless. when you want to restore emails of single user, you can’t just do it if you have thousands and lacs of emails in single account.

I hope that my blog is an eye opening content for SME owners. There are solutions available to take care of all above points and adopt aforesaid solution practices.

Best Regards,

Vishal Shah

Founder and CEO,

Synersoft Technologies Pvt Ltd

Leave a Reply

Your email address will not be published. Required fields are marked *

Demo

Want to know More?

Ask for Demo





    captcha
    Check

    IT INFRASTRUCTURE AUDIT

    Reality Check Voucher worth INR 20000 NOW FREE

               








      captcha