IT Tips 101 – Your Data

IT Tips 101 – Your Data

At Hyper 1 Digital we are passionate about IT and securing you data. 

Many companies store their data locally but many fail to ensure their data is secure and regularly backed up. 

Today I am going to cover how to secure your data and keep your business safe. 

Your data is the key to your business and securing it against failure, corruption and deletion is a *MUST*. Ensuring your data is secured and backed up is a task in itself specially without professional help. At Hyper 1 Digital we manage data backups for companies that fail to do it themselves and advise on how to keep the data secure within a working environment. 

Data security issues does not always come from external breaches but internal breaches. Take a look at the Sage their security breach came from their internal member of staff - BBC NEWS FEED 

So how can we ensure our data is secure, backed up and easily restored.

Securing Your Data Within

Internal security is a must when it comes to company data. There may be users that only need a certain level of access or a department that has to be restricted such as HR folders and Accounts folders. Securing the data internally allows you to limit the access rights and to track last know user access by enabling permissions, logging and folder enumeration. 

Lets take a look at folder permissions

What are folder permissions ? 

Folder permissions is a security function to limit file and folder access to specified members of staff or groups. Setting folder permissions avoids members of staff accessing data they are forbidden to see, folder permissions can be allocated to user or on a group basis which consists of multiple users such as a department or a set group of people. 



Data Security

What levels are there for folder permissions ? 

Full Control

  • view file name and subfolders
  • navigate to subfolders
  • view data in the folder's files
  • add files and subfolders to the folder
  • change the folder's files
  • delete the folder and its files
  • change permissions 
  • take ownership of the folder and its files


  • view the file names and subfolders
  • navigate to subfolders
  • view data in the folder's files
  • add files and subfolders to the folder
  • change the folder's files
  • delete the folder and its files
  • open and change files

Read & Execute

  • view file names and subfolder names
  • navigate to subfolders
  • view data in the folder's files
  • run applications

List Folder Contents

  • view the file names and subfolder names
  • navigate to subfolders
  • view folders
  • does not permit access to the folder's files


  • view the file names and subfolder names
  • navigate to subfolders
  • open files
  • copy and view data in the folder's files


  • create folders
  • add new files
  • delete files

Allocating the level of permissions to your internal data is guaranteed to reduce the risk of internal breaches from members of staff intentionally or unintentionally. Permissions are the key to securing data but also centrally managing the data structure by restricting users creating folders anywhere in you data share. 

Ensuring your data share is secure but tidy allows the support company or the dedicated member of staff to easily restore any files and folders. 

What to stop and monitor internally

Internal Security is the first thing you need to action to avoid any data breaches and avoid data loss. So what can be stopped and monitored to ensure your data is secure. 

What to stop ? 

There is a wide range of areas we cover about restriction and what to stop but the main areas are 

  1. USB Drive access 
  2. Installing applications 
  3. Website access
  4. Personal Email 

The 4 bullet points ensure there will be no risk from users plugging virus infected USB drives into your company network, installing applications with hidden viruses or trojans, visiting infected websites and most of all access personal emails that could either be infected or phishing emails that ask for personal details. 

What to monitor ?

Monitoring your network is the key to ensuring full data security. So what can we monitor, folder access and access attempts and website usage. Monitoring these two areas and ensuring staff are aware of the monitoring reduces the internal security breaches and attempts within the business. 

External threats and how to secure your data

External threats are a constant worry for companies with sensitive data or data they require to ensure the business is fully operational. So how do we secure from the external threats ? 


Lets start by ensuring your internet connection has a firewall with firewall restrictions in place to ensure only allowed traffic is passed through to your network. A firewall is not just a device that sits and restricts traffic but it can also stop attack attempts to take down your network. 

Anti Virus 

External threats come in many shapes and forms but mainly by a virus or trojan horse downloaded by the user. Normally this is at no fault of the user and can be blocked by an anti virus that will run regular scans on the computers and run real time protection that will run live scans on email, external drives and network access.

Backing up your data 

Backing up your data can be achieved locally or by installing an application that will back up to a remote data centre. Both methods have their ups and downs but both ensure your data is backed up on a regular basis.

Local Backups

Normally achieved by using an external hard drive or tape device that requires user intervention to swap them over and take one of site. Local backups are cost effective in the long run but create risk if the schedule is missed.

Cloud Backups

Cloud backup solutions have now become the most commonly used method of backing up date. the cloud backup solution Hyper 1 Digital offer backs up to two locations amazon storage and rack space in London. This solutions is based on usage and is charged monthly. This solution ensures there is an offsite backup of your data but without any user intervention.


For more information on securing your data get in touch 01226 610240 or message us 


About the author

hyadmin administrator

Leave a Reply

%d bloggers like this: