2.3 Protecting your information assets
Now you’ve done a risk analysis, it’s time to look at how we can better protect our information assets.
You’ve already thought about backing up data and using encryption to protect information – but have you put any of these measures into practice?
Go back to the list of information assets you used in your risk analysis. What steps have you taken to protect them? Think in terms of what you have studied on this course. For example:
- Have you set up firewalls to protect your networked computers from external attack?
- Are you protected by up to date antivirus software?
- Are your operating system and key applications up to date?
- Is important information protected by encryption?
Note, next to each item on your list, the measure you have taken to protect it. If you have not yet implemented that measure, identify it in some way that will remind you to action it.
In the next section, you are invited to create a plan for implementing and maintaining your information security.