Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The security issue dealing with IM, is a key element in IM process. Information is not always given the protection it deserves based on its value. The following best practices are to consider:·        

  • Identify roles and responsibilities in regard to the access, protection, and distribution of information.

...

  • Categorize information - don't treat all information the same. categorize information to manage it according to its value.

...

  • Store information and data according to its value.

...

  • Protect data according to its value

...

  • Replicate critical information and data throughout the day to ensure no data loss incurs

...

  • Backup important data and information to an alternative location

...

  • Test data recovery and business continuity/disaster recovery regularly (daily) to ensure it can overcome any potential data loss as soon as possible.

  • Ensure types of users are identified and enforced, such as administrator, read and write access, read only access or no access