{"id":41177,"date":"2021-08-12T08:21:39","date_gmt":"2021-08-12T12:21:39","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=41177"},"modified":"2021-08-14T15:16:36","modified_gmt":"2021-08-14T19:16:36","slug":"7-tips-on-storing-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/41177\/","title":{"rendered":"7 tips for storing confidential data"},"content":{"rendered":"<p>There\u2019s no such thing as a business that doesn\u2019t have sensitive data. Even a small retail company has documents with employees\u2019 personal details that legally must remain confidential, for example. Bank documents would be hard to restore. Supplier and contractor contracts could include trade secrets.<\/p>\n<p>To protect important data from loss or inappropriate disclosure, follow these seven tips.<\/p>\n<h2>1. Enable full disk encryption on all devices<\/h2>\n<p>On devices where confidential data is stored or transmitted (i.e., most of them), be sure to enable full disk encryption (FDE). Encryption protects the data in case the device falls into the wrong hands. In Windows, the FDE tool is called BitLocker. The macOS equivalent is FileVault. FDE is enabled by default on most iOS and Android phones; don\u2019t disable it unless absolutely necessary.<\/p>\n<h2>2. Restrict confidential data to the office<\/h2>\n<p>Another way important data can fall into the wrong hands is through the loss (or theft) of physical media: external hard disks or flash drives. Ideally, they should never leave the office. In fact, if you must write to an external medium, you should encrypt the data beforehand. For example, many <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">security solutions for small businesses<\/a> support encrypted storage in the form of cryptocontainers.<\/p>\n<h2>3. Don\u2019t transfer unencrypted data over the Internet<\/h2>\n<p>Sometimes you might need to send confidential data online, by e-mail or a file-sharing service. We strongly recommend avoiding it whenever possible, but if you absolutely have to send information, at least encrypt it first, in case of interception. The easiest way is to create a password-protected archive. Almost all archive utilities have this option. After you encrypt the information, send the password to the recipient through a different channel \u2014 for example, attach the information to an e-mail, but send the password through a messaging app that supports <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/end-to-end-encryption\/\" target=\"_blank\" rel=\"noopener\">end-to-end encryption<\/a>.<\/p>\n<h2>4. Delete sensitive data you no longer need<\/h2>\n<p>Even information that\u2019s fallen out of use can still cause problems, so get rid of it. For less-sensitive information, at the very least, delete it and then empty your Recycle Bin so the data can\u2019t be restored with a simple click. For anything even vaguely sensitive, use a file-shredder utility to prevent recovery.<\/p>\n<h2>5. Encrypt backups<\/h2>\n<p>Backups are crucial, but they can also be a source of leaks. That\u2019s why, before creating backups of confidential data, you should place them in a cryptocontainer.<\/p>\n<h2>6. Store more than one copy<\/h2>\n<p>Store your data in <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-in-dental-data-backup-firm\/28755\/\" target=\"_blank\" rel=\"noopener nofollow\">several places isolated from each other<\/a>. For example, you might keep one copy of a file on your computer and another on an external drive or in reliable cloud storage. Again, don\u2019t forget to encrypt the files beforehand (or follow all other advice here).<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n<h2>7. Secure archive and cryptocontainer passwords<\/h2>\n<p>Losing the password for an archive containing important business data means losing that data. Store passwords in a purpose-built application such as our application for creating and securely storing complex passwords. In addition to its password management utility, <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">our security solution for SMBs<\/a> also features tools for creating cryptocontainers and automating data backup processes. Naturally, it also protects computers and smartphones from malware, whose tasks can include rooting out company secrets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Loss or leaks of sensitive information can be serious problems for small businesses. Here\u2019s how to keep confidential data safe.<\/p>\n","protected":false},"author":2581,"featured_media":41178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[586,261,961],"class_list":{"0":"post-41177","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-backup","10":"tag-encryption","11":"tag-leaks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/41177\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/7-tips-on-storing-sensitive-data\/23191\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/18679\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/9317\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/25216\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/7-tips-on-storing-sensitive-data\/23281\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/7-tips-on-storing-sensitive-data\/22590\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/7-tips-on-storing-sensitive-data\/25813\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/7-tips-on-storing-sensitive-data\/25323\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/7-tips-on-storing-sensitive-data\/31251\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/7-tips-on-storing-sensitive-data\/9939\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/7-tips-on-storing-sensitive-data\/17477\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/7-tips-on-storing-sensitive-data\/17929\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/7-tips-on-storing-sensitive-data\/15142\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/7-tips-on-storing-sensitive-data\/27204\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/7-tips-on-storing-sensitive-data\/27412\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/7-tips-on-storing-sensitive-data\/24228\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/7-tips-on-storing-sensitive-data\/29543\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/7-tips-on-storing-sensitive-data\/29348\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=41177"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41177\/revisions"}],"predecessor-version":[{"id":41212,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41177\/revisions\/41212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41178"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=41177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=41177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}