The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency. ~Bill Gates
We are seeing multiple stories on the news about information being compromised at stores, restaurants, and even our government agencies. Your data is not safe unless you take special care in protecting the content of your servers. There are different levels of security required. Remember, the data you are protecting is not only your information, but hat of your clients, vendors and partners. It is important to protect the hardware storing your information and who has access to it. You are responsible for ensuring that your data is kept confidentially but also that the integrity of your system is not compromised.
Most of us understand that in order to protect data it must be encrypted so that hackers cannot read the information we store and transmit. However, there are many options available offering different levels of protection. The answer to the choices presented depends on the data stored, the methods of transmittal to and from your clients, and your understanding of the security scenario. IT Security should now be a top priority for all businesses, small or large, and management should understand the risks involved and how to mitigate them.