Integrity

24th December 2019 | Cybrary Integrity


Integrity is the property whereby information (data), an information system, or a component of a system has not been modified or destroyed in an unauthorized manner. It is also a state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.

How does data Integrity relate to SMBs?

Data Integrity is important when working with critical and sensitive information. For example, if you leave your salary data on a shared drive in your file server and this is what ADP keys off of when Payroll is completed, what would happen if an employee took advantage of a new HR person doing payroll by changing the excel spreadsheet on salaries?  Would you discover the integrity of the Salary Excel had been compromised (not to mention the confidentiality)?

Here are some actions CyberHoot recommends to protect Data Integerity:

  1. Encryption of data while in transit and at rest.
  2. Follow the principle of “Least Privilege” and “Confidentiality
  3. Remove Administrator  privileges monitored to accidental incidents.
  4. Regular data back-ups to ensure data is never lost or changed.

Related Terms: Privacy, Availability, Confidentiality, Data Integrity, System Integrity

Source: CNSSI 4009, NIST SP 800-53 Rev 4, 44 U.S.C., Sec 3542, SANS; From SAFE-BioPharma Certificate Policy 2.5

If you would like to learn more about this topic, watch these short videos:

Integrity – Level 1

Data Integrity – Level 2

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more