{"id":67748,"date":"2017-10-05T16:12:20","date_gmt":"2017-10-05T20:12:20","guid":{"rendered":"https:\/\/www.exittechnlive.wpenginepowered.com\/?p=67748"},"modified":"2026-01-21T19:05:59","modified_gmt":"2026-01-21T19:05:59","slug":"undvik-nasta-stora-datalacka-korrekt-datasakerhet","status":"publish","type":"post","link":"https:\/\/exittechnologies.com\/sv\/blogg\/datacenter\/undvik-nasta-stora-datalacka-korrekt-datasakerhet\/","title":{"rendered":"S\u00e5 h\u00e4r undviker du datal\u00e4ckage med r\u00e4tt datas\u00e4kerhet"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">L\u00e4stid: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">Protokoll<\/span><\/span>\n<h2 class=\"wp-block-heading\">Anv\u00e4nd ITAD och radering av data f\u00f6r att undvika datal\u00e4ckage<\/h2>\n\n\n\n<p>Ber\u00e4ttelser om datal\u00e4ckor s\u00e4tter skr\u00e4ck i alla utom de mest stoiska IT-cheferna. Bara h\u00e4romdagen kr\u00e4vde en blackhat-grupp miljoner med ransomware fr\u00e5n en advokatbyr\u00e5.&nbsp;<\/p>\n\n\n\n<p>Medan <span id=\"urn:enhancement-141a0ba6\" class=\"textannotation disambiguated wl-thing\">Datas\u00e4kerhet<\/span> \u00c5tg\u00e4rderna f\u00f6rb\u00e4ttras, <span id=\"urn:enhancement-b64affc6\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4ckor och cyberattacker \u00e4r fortfarande ett mycket verkligt problem.<\/p>\n\n\n\n<p>143 miljoner m\u00e4nniskor l\u00e4mnades s\u00e5rbara n\u00e4r Equifax system utsattes f\u00f6r intr\u00e5ng mellan maj och juli i \u00e5r.<\/p>\n\n\n\n<p>Hackare hade tillg\u00e5ng till alla typer av k\u00e4nsliga <span id=\"urn:enhancement-1b35e16\" class=\"textannotation disambiguated wl-thing\">personlig information<\/span>.<\/p>\n\n\n\n<!--more-->\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Hackarna kom \u00e5t m\u00e4nniskors namn, personnummer, f\u00f6delsedatum, adresser och, i vissa fall, k\u00f6rkortsnummer. De stal ocks\u00e5 kreditkortsnummer f\u00f6r cirka 209.000 personer och tvistedokument med <span id=\"urn:enhancement-61d0d921\" class=\"textannotation disambiguated wl-thing\">personlig identifierande information<\/span> f\u00f6r cirka 182.000 personer.- Federal Trade Commission<\/p>\n<\/blockquote>\n\n\n\n<p>Detta inl\u00e4gg kommer att g\u00e5 igenom b\u00e4sta praxis f\u00f6r b\u00e5de <span id=\"urn:enhancement-cb1026b9\" class=\"textannotation disambiguated wl-thing\">data<\/span> skydd och <span id=\"urn:enhancement-578d14df\" class=\"textannotation disambiguated wl-thing\">data<\/span> radering.<\/p>\n\n\n\n<p>Den kommer ocks\u00e5 att omfatta tj\u00e4nster som kan hj\u00e4lpa dig att s\u00e4kra din <span id=\"urn:enhancement-9c8bcc68\" class=\"textannotation disambiguated wl-thing\">data<\/span> mer effektivt. Detta kommer f\u00f6rhoppningsvis att s\u00e4kerst\u00e4lla att ditt f\u00f6retag kan undvika en <span id=\"urn:enhancement-fc47c25b\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4ckage.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><a href=\"https:\/\/exittechnologies.com\/wp-content\/uploads\/2017\/10\/avoid-a-data-leak.jpg\"><img decoding=\"async\" width=\"900\" height=\"525\" src=\"https:\/\/exittechnologies.com\/wp-content\/uploads\/2017\/10\/avoid-a-data-leak.jpg\" alt=\"undvika datal\u00e4ckage\" class=\"wp-image-71429\" srcset=\"https:\/\/exittechnologies.com\/wp-content\/uploads\/2017\/10\/avoid-a-data-leak.jpg 900w, https:\/\/exittechnologies.com\/wp-content\/uploads\/2017\/10\/avoid-a-data-leak-300x175.jpg 300w, https:\/\/exittechnologies.com\/wp-content\/uploads\/2017\/10\/avoid-a-data-leak-768x448.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Identifiera dina data<\/h2>\n\n\n\n<p>Det f\u00f6rsta steget i <a href=\"https:\/\/exittechnologies.com\/sv\/blogg\/datacenter\/skapa-migrationsplan-for-datacenter-framgangsrik-migration\/\">skapa en migrationsplan<\/a> och skydda k\u00e4nsliga <span id=\"urn:enhancement-aeb74190\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r att identifiera vilka <span id=\"urn:enhancement-5a52ff65\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r k\u00e4nslig.<\/p>\n\n\n\n<p><span id=\"urn:enhancement-a9683260\" class=\"textannotation disambiguated wl-thing\">Skydd mot dataf\u00f6rlust<\/span> (DLP), \u00e4r en viktig komponent i de flesta av <span id=\"urn:enhancement-6184d897\" class=\"textannotation disambiguated wl-thing\">data<\/span> strategier f\u00f6r skydd. Den \u00e4r starkt beroende av <span id=\"urn:enhancement-250a4aa4\" class=\"textannotation disambiguated wl-thing\">data<\/span> tillr\u00e4ckligt kategoriserade och identifierade.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Organisering och kategorisering av data<\/h2>\n\n\n\n<p>Klassificering av enorma m\u00e4ngder <span id=\"urn:enhancement-ec5dbb6d\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r inte n\u00e5gons id\u00e9 om en bra tid.<\/p>\n\n\n\n<p>Du beh\u00f6ver dock inte k\u00e4nna dig \u00f6verv\u00e4ldigad av den enorma uppgiften. Det kan vara en gradvis process.<\/p>\n\n\n\n<p>B\u00f6rja med de sm\u00e5 modulerna och arbeta dig fram till mer viktiga \u00e4ndpunkter i n\u00e4tverket. Det g\u00f6r det l\u00e4ttare f\u00f6r dina medarbetare att l\u00e4ra sig processen innan en mer omfattande utv\u00e4rdering.<\/p>\n\n\n\n<p>En genomg\u00e5ng av de f\u00f6rsta resultaten \u00e4r en bra id\u00e9 efter att de inledande stegen har slutf\u00f6rts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kryptera dina data<\/h2>\n\n\n\n<p>Kryptering l\u00e4gger ytterligare ett lager av s\u00e4kerhet mellan dig och hackare.<\/p>\n\n\n\n<p>Om Equifax skulle ha vidtagit denna extra f\u00f6rsiktighets\u00e5tg\u00e4rd skulle det ha gjort <span id=\"urn:enhancement-eec43370\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4ckage obetydligt, eftersom <span id=\"urn:enhancement-8fb2f17f\" class=\"textannotation disambiguated wl-thing\">data<\/span> skulle ha blivit ol\u00e4sliga.<\/p>\n\n\n\n<p>Om din <span id=\"urn:enhancement-2bda4490\" class=\"textannotation disambiguated wl-thing\">data<\/span> har krypterats och nycklarna \u00e4r s\u00e4kra, bra. F\u00f6r \u00e4ven om den blir stulen, s\u00e5 \u00e4r <span id=\"urn:enhancement-2666aee0\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r fortfarande s\u00e4ker.<\/p>\n\n\n\n<p>\u00c4ven om kryptering \u00e4r l\u00e5ngt ifr\u00e5n vattent\u00e4tt \u00e4r det fortfarande ett av de b\u00e4ttre s\u00e4tten att skydda din <span id=\"urn:enhancement-ddeaf911\" class=\"textannotation disambiguated wl-thing\">data<\/span>. Det \u00e4r mycket b\u00e4ttre \u00e4n att inte ha kryptering f\u00f6r k\u00e4nsliga <span id=\"urn:enhancement-87289005\" class=\"textannotation disambiguated wl-thing\">data<\/span>.<\/p>\n\n\n\n<p>Kryptering anv\u00e4nds b\u00e4st p\u00e5 olika st\u00e4llen i n\u00e4tverket. Detta g\u00e4ller s\u00e4rskilt f\u00f6r <span id=\"urn:enhancement-4ae363cc\" class=\"textannotation disambiguated wl-thing\">data<\/span> i vila eller under transport.<\/p>\n\n\n\n<p>Med en solid krypteringsstrategi kan \u00e4ven mer sofistikerade hackningsf\u00f6rs\u00f6k stoppas.<\/p>\n\n\n\n<p>Organisationen \u00e4r ocks\u00e5 skyddad mot otillb\u00f6rlig <span id=\"urn:enhancement-6097f24a\" class=\"textannotation disambiguated wl-thing\">data<\/span> metoder f\u00f6r radering. \u00c4ven om k\u00e4nsliga <span id=\"urn:enhancement-8cbc7e9e\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4mnas kvar p\u00e5 kasserade h\u00e5rddiskar och hittas av nyfikna \u00f6gon, krypteras <span id=\"urn:enhancement-7693d984\" class=\"textannotation disambiguated wl-thing\">data<\/span> kommer att vara s\u00e4kra fr\u00e5n exponering.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00d6vervaka dina data<\/h2>\n\n\n\n<p>\u00d6vervakning <span id=\"urn:enhancement-f0d39cc\" class=\"textannotation disambiguated wl-thing\">data<\/span> anv\u00e4ndning och \u00f6verf\u00f6ring kan varna f\u00f6retag f\u00f6r intr\u00e5ng innan de ens intr\u00e4ffar.<\/p>\n\n\n\n<p>De flesta hacks \u00e4r inte snabba h\u00e4ndelser.<\/p>\n\n\n\n<p>M\u00e5lets <span id=\"urn:enhancement-c9fc5c2e\" class=\"textannotation disambiguated wl-thing\">data<\/span> tog knappt en m\u00e5nad att slutf\u00f6ra, och Equifax tog \u00f6ver tv\u00e5 m\u00e5nader.<\/p>\n\n\n\n<p>Genom att \u00f6vervaka befintliga, ofarliga <span id=\"urn:enhancement-78063117\" class=\"textannotation disambiguated wl-thing\">data<\/span> anv\u00e4ndning blir det l\u00e4ttare att filtrera bort <span id=\"urn:enhancement-31192692\" class=\"textannotation disambiguated wl-thing\">data<\/span> anv\u00e4ndning som inte passar in i befintliga m\u00f6nster.<\/p>\n\n\n\n<p>\u00d6vervakning av f\u00f6rflyttning av k\u00e4nsliga <span id=\"urn:enhancement-a837a9b5\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r s\u00e4rskilt viktigt f\u00f6r att ge insikt i potentiella h\u00e5l i en DLP-strategi.<\/p>\n\n\n\n<p>Det \u00e4r ocks\u00e5 l\u00e4ttare att s\u00e4kerst\u00e4lla korrekt <span id=\"urn:enhancement-d29dbf0d\" class=\"textannotation disambiguated wl-thing\">data<\/span> radering n\u00e4r organisationen vet var kritiskt <span id=\"urn:enhancement-7b94dd16\" class=\"textannotation disambiguated wl-thing\">data<\/span> \u00e4r inrymd. <a href=\"https:\/\/exittechnologies.com\/sv\/blogg\/itad\/itam-itam-gar\/\">ITAM-l\u00f6sningar<\/a> kan vara anv\u00e4ndbart f\u00f6r detta.<\/p>\n\n\n\n<p>\u00d6vervakning \u00e4r en viktig pusselbit n\u00e4r det g\u00e4ller att undvika en <span id=\"urn:enhancement-5c02777e\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4ckage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u00e4kra slutpunkter<\/h2>\n\n\n\n<p>De punkter d\u00e4r din <span id=\"urn:enhancement-acbda5f3\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4mnar n\u00e4tverket \u00e4r mer s\u00e5rbara f\u00f6r attacker. De \u00e4r det st\u00f6rsta ansvaret f\u00f6r att orsaka en <span id=\"urn:enhancement-863d8acd\" class=\"textannotation disambiguated wl-thing\">data<\/span> l\u00e4ckage.<\/p>\n\n\n\n<p>Bring Your Own Device (BYOD) \u00e4r en policy som v\u00e4xer. Och det kommer bara att g\u00f6ra <span id=\"urn:enhancement-58412a19\" class=\"textannotation disambiguated wl-thing\">slutpunkt<\/span> Hanteringen blir allt viktigare. Detta eftersom varje enhet l\u00e4gger till ytterligare <span id=\"urn:enhancement-29d26e18\" class=\"textannotation disambiguated wl-thing\">slutpunkt<\/span> och potentiell riskfaktor.<\/p>\n\n\n\n<p>Anv\u00e4nd en DLP-programvara som \u00f6vervakar och agerar specifikt p\u00e5 slutpunkter. Gartner tillhandah\u00e5ller en <a href=\"https:\/\/www.gartner.com\/reviews\/market\/EnterpriseDataLossPrevention\" target=\"_blank\" rel=\"noopener noreferrer\">\u00f6versikt \u00f6ver de f\u00f6r n\u00e4rvarande b\u00e4sta DLP-programvarorna<\/a>.<\/p>\n\n\n\n<p>BYOD inneb\u00e4r en helt ny typ av sv\u00e5righeter. Anv\u00e4ndarna av enheterna kan vara utspridda p\u00e5 olika platser. De kan ocks\u00e5 anv\u00e4nda m\u00e5nga olika plattformar f\u00f6r att komma \u00e5t ditt n\u00e4tverk.<\/p>\n\n\n\n<p>En central kontrollpunkt ger en helhetsbild av ditt n\u00e4tverk, oavsett hur m\u00e5nga platser och enheter som anv\u00e4nder det. Utan en s\u00e5dan kan det ta m\u00e5nader att uppt\u00e4cka en l\u00e4cka.<\/p>\n\n\n\n<p>T\u00e4nk dig att g\u00e5 flera m\u00e5nader innan du inser att en <span id=\"urn:enhancement-9c918b66\" class=\"textannotation disambiguated wl-thing\">slutpunkt<\/span> komprometterades?<\/p>\n\n\n\n<p>Dessutom, med alla potentiella effektm\u00e5tt identifierade, <span id=\"urn:enhancement-2d154d71\" class=\"textannotation disambiguated wl-thing\">data<\/span> radering f\u00f6r riskmedarbetares enheter \u00e4r enklare att underh\u00e5lla.<\/p>\n\n\n\n<p>All riskfylld pensionerad utrustning kan \u00f6verl\u00e5tas till r\u00e4tt <span id=\"urn:enhancement-7e4d05cc\" class=\"textannotation disambiguated wl-thing\">data<\/span> inte i papperskorgen hemma. H\u00e4rifr\u00e5n kan det hamna var som helst och i h\u00e4nderna p\u00e5 vem som helst.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u00e4kra den m\u00e4nskliga faktorn f\u00f6r att undvika dataintr\u00e5ng<\/h2>\n\n\n\n<p>Systemen blir allt s\u00e4krare och mer komplexa, och de mest s\u00e5rbara punkterna \u00e4r nu m\u00e4nniskorna som anv\u00e4nder dem. Det \u00e4r inte alltid sj\u00e4lva systemen.<\/p>\n\n\n\n<p>Det spelar ingen roll om du har v\u00e4rldens mest effektiva nyckelkrypteringssystem om din medarbetare ger nycklarna till en hackare.<\/p>\n\n\n\n<p>Bekr\u00e4fta konsekvent de policyer du inf\u00f6rt f\u00f6r dina anst\u00e4llda. L\u00e4gg ansvaret p\u00e5 dem att hj\u00e4lpa andra anst\u00e4llda att f\u00f6lja dessa policyer och fr\u00e4mja en kultur av noggrannhet i ditt f\u00f6retag.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Konsekvent datas\u00e4kerhet: Det b\u00e4sta s\u00e4ttet att undvika datal\u00e4ckage<\/h2>\n\n\n\n<p>Datas\u00e4kerheten upph\u00f6r inte n\u00e4r utrustningen tas ur bruk.<\/p>\n\n\n\n<p>Ibland \u00e4ven om du redan har utf\u00f6rt <span id=\"urn:enhancement-71a476dd\" class=\"textannotation disambiguated wl-thing\">data<\/span> radering. \u00c4ven <span id=\"urn:enhancement-72604b90\" class=\"textannotation disambiguated wl-thing\">data<\/span> som har \"raderats\" kan \u00e5terst\u00e4llas om inte varje bit har skrivits \u00f6ver med en 0.<\/p>\n\n\n\n<p>L\u00e4gg inte \u00e5ratal p\u00e5 att s\u00e4kra din <span id=\"urn:enhancement-667eb04e\" class=\"textannotation disambiguated wl-thing\">data<\/span> bara f\u00f6r att kasta ut den och bli nedtagen av en dumpsterdykare p\u00e5 grund av slarvigt <a href=\"https:\/\/exittechnologies.com\/sv\/blogg\/itad\/rensa-en-harddisk\/\">radering av data<\/a>.<\/p>\n\n\n\n<p>En annan punkt <span id=\"urn:enhancement-dc267a02\" class=\"textannotation disambiguated wl-thing\">S\u00e5rbarhet<\/span> \u00e4r under flytt av datacenter.<\/p>\n\n\n\n<p>Under <a href=\"https:\/\/exittechnologies.com\/sv\/datacentertjanster\/data-center-decommissioning-services\/\"><span id=\"urn:local-annotation-187862\" class=\"textannotation disambiguated wl-link\">Avveckling av datacenter<\/span><\/a> eller <span id=\"urn:local-annotation-259939\" class=\"textannotation disambiguated wl-link\"><a href=\"https:\/\/exittechnologies.com\/sv\/datacentertjanster\/likvidation\/\">avveckling av datacenter<\/a>, <\/span>kan det vara l\u00e4tt att tappa bort <span id=\"urn:enhancement-35d304e5\" class=\"textannotation disambiguated wl-thing\">data<\/span> och exponera <span id=\"urn:enhancement-19e7b096\" class=\"textannotation disambiguated wl-thing\">S\u00e5rbarheter<\/span>.<\/p>\n\n\n\n<p>Det ligger i ditt eget intresse att arbeta med en <a href=\"https:\/\/exittechnologies.com\/sv\/datacentertjanster\/itad\/\">ITAD <\/a>f\u00f6retag. Ett f\u00f6retag som har erfarenhet av <span id=\"urn:enhancement-eed010f9\" class=\"textannotation disambiguated wl-thing\">Datas\u00e4kerhet<\/span> n\u00e4r <span id=\"urn:enhancement-2c073a8f\" class=\"textannotation disambiguated wl-thing\">planering<\/span> en datacenterverksamhet.<\/p>\n\n\n\n<p><a href=\"https:\/\/exittechnologies.com\/sv\/datacentertjanster\/utplaning\/\"><span id=\"urn:local-annotation-947167\" class=\"textannotation disambiguated wl-link\">Korrekt radering av data<\/span><\/a> beh\u00f6ver inte vara kr\u00e5ngligt eller kostsamt.<\/p>\n\n\n\n<p>Faktum \u00e4r att exIT Technologies kommer att betala dig f\u00f6r din \u00f6verblivna utrustning och torka den med R2-certifierad s\u00e4kerhet som \u00e4ven myndigheter litar p\u00e5.<\/p>\n\n\n\n<p><a class=\"button\" href=\"\/sv\/kontakta-oss\/\">Kontakta exIT Technologies f\u00f6r att f\u00e5 en offert idag<\/a><\/p>\n\n\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Using ITAD and Data Erasure to Avoid a Data Leak Data leak stories inspire terror in all but the most stoic IT executives. Just the other day a blackhat group demanded millions with ransomware from a law firm.&nbsp; While data security measures are improving, data leaks and cyber attacks are still a very real problem. [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":67824,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[43],"tags":[],"class_list":["post-67748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-center"],"acf":[],"_links":{"self":[{"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/posts\/67748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/comments?post=67748"}],"version-history":[{"count":0,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/posts\/67748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/media\/67824"}],"wp:attachment":[{"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/media?parent=67748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/categories?post=67748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exittechnologies.com\/sv\/wp-json\/wp\/v2\/tags?post=67748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}