Four ways to secure sensitive data
Read our tips to ensure that your business and customer data is kept as secure as possible


Keeping data safe has never been more critical for businesses, but implementing effective security can sometimes seem overwhelming, with a huge range of options.
There's no silver bullet for guaranteeing security of your organisation's data, but a layered approach, combining tools, practices and culture can make sure that as much has been done as possible.
Here are some tips to ensure that sensitive data is kept safe without introducing cumbersome security practices that staff will struggle to stick to.
Prioritise encryption
Encrypting data is one of the best ways to ensure that it doesn't fall into the wrong hands. Even if an attacker manages to access data, it is of little or no value if it's encrypted.
Like overall security practices, applying a layered approach to data encryption ensures that it's as secure as possible. This means encrypting data in transit between a store and an end user, as well as encrypting data at rest' in the databases where it's stored.
Some applications provide encryption services at the software layer, but this can bring costs in terms of complexity and reduced performance. Encryption software that runs as close to the storage hardware as possible is better for providing a transparent layer of encryption.
Reinforce database protection
The point at which data enters your organisation can be vulnerable to attackers attempting to gain access to your systems. Passing dangerous payloads to poorly designed systems means that bad actors can exploit flaws to get control through strategies like SQL injection.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
A layered approach where validation is built into the code at each step can dramatically reduce your database's vulnerability to these sorts of attacks. Frequent manual and automated reviews and tests will also help support this effort.
Other steps that will help reinforce database protection include only accepting validated data into production systems, monitoring systems for errors and edge cases which could be caused by attackers, and adopting an identity management system so only authorised individuals can access data systems of records.
Separate out sensitive data
It may seem obvious, but the fewer places sensitive data exists, the fewer opportunities there are for attackers to get hold of it. Sensitive data should never be used or stored in non-production systems, and access passwords should be stored in a password manager rather than entrusted to individuals.
Some teams may require data that reliably mimics the real thing for testing, but rather than refreshing development and testing environments with production data, it is worth considering using tools that configure and generate dummy data. This allows reliable, realistic testing without risking sensitive information.
Build a culture of security
Building a culture in your business that has security at its heart is crucial to enforcing security policies, and reduces the risk of a successful attack.
There are two main prongs to building a culture of security. The first is policy-based, where a company can enforce password policies like complex passwords and regular changes, and two-factor authentication to minimise the risk of unauthorised access. Some businesses use VPNs to secure access to internal corporate networks.
The second is through educating employees, and providing training on how to protect corporate devices physically as well as through strong passwords. Regularly highlighting the danger of social attacks like phishing will help keep employee awareness high.
Esther is a freelance media analyst, podcaster, and one-third of Media Voices. She has previously worked as a content marketing lead for Dennis Publishing and the Media Briefing. She writes frequently on topics such as subscriptions and tech developments for industry sites such as Digital Content Next and What’s New in Publishing. She is co-founder of the Publisher Podcast Awards and Publisher Podcast Summit; the first conference and awards dedicated to celebrating and elevating publisher podcasts.
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott Published
-
Young tech professionals are shunning a full-time return to the office – unless it pays more
News Young tech professionals who entered the workforce post-pandemic expect on-site work to be paid more than remote options.
By Emma Woollacott Published
-
The rise of identity-based cyber attacks and how to mitigate them
In-depth If identity-based cyber attacks are successful, they can give hackers the opportunity to infiltrate an entire network
By Sandra Vogel Published
-
2022 Public Sector Identity Index Report
Whitepaper UK Report
By ITPro Published
-
Modernising identity for a secure, agile hybrid workforce
Whitepaper Pave the way towards a modern, secure, efficient, and sustainable hybrid workplac
By ITPro Published
-
Business customer identity for SaaS apps - simplified
Whitepaper Accelerate business growth with a scalable enterprise identity solution purpose-built for SaaS apps
By ITPro Published
-
A comprehensive guide for your Customer Identity Maturity journey
Whitepaper A flexible approach to help any company advance its identity posture
By ITPro Published
-
The Okta hybrid work report 2023
Whitepaper How European leaders are building long-term strategies for hybrid working
By ITPro Published
-
Anatomy of identity-based attacks
Whitepaper Helping security teams mitigate identity-based attacks
By ITPro Published
-
SolarWinds hackers strike again with a new “MagicWeb” authentication exploit
News Microsoft warns MagicWeb can abuse admin credentials to hijack AD FS enterprise identity system
By Praharsha Anand Published