Aug 16

Database security 101 Part 5

Planning security
Most of the ready to use databases will have built-in security features such as setting up individual accounts, and privilege sets for each of these accounts. If you are thinking of buying a database program, do your research to find one that offers good security with ease of use.

Security is important, of course, but leave some wiggle room as well for individual circumstances, for example, the executive who has to work from home a couple of days a week.
Layer security at every area of access, including locking down computers, setting accounts and privileges in the databases, restricting access to directories, and taking other steps to protect the data.
Make sure you have a frequent and regular update schedule, with a way to restore data if it is inadvertently destroyed or is hacked and tampered with.
Continually evaluate your security to make sure it is protecting your data. This includes verifying that users have the latest, most secure software versions, changing passwords on a regular and ongoing basis, evaluating log files to avoid surprises, and rigorously following a back-up scheme. This all involves work, but you can’t afford to be complacent.
Configure and test security options as you add data to your files over time.

Leave a Reply