Integrity

24th December 2019 | Cybrary Integrity


Integrity is the property whereby information (data), an information system, or a component of a system has not been modified or destroyed in an unauthorized manner. It is also a state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.

How does data Integrity relate to SMBs?

Data Integrity is important when working with critical and sensitive information. For example, if you leave your salary data on a shared drive in your file server and this is what ADP keys off of when Payroll is completed, what would happen if an employee took advantage of a new HR person doing payroll by changing the excel spreadsheet on salaries?  Would you discover the integrity of the Salary Excel had been compromised (not to mention the confidentiality)?

Here are some actions CyberHoot recommends to protect Data Integerity:

  1. Encryption of data while in transit and at rest.
  2. Follow the principle of “Least Privilege” and “Confidentiality
  3. Remove Administrator  privileges monitored to accidental incidents.
  4. Regular data back-ups to ensure data is never lost or changed.

Related Terms: Privacy, Availability, Confidentiality, Data Integrity, System Integrity

Source: CNSSI 4009, NIST SP 800-53 Rev 4, 44 U.S.C., Sec 3542, SANS; From SAFE-BioPharma Certificate Policy 2.5

If you would like to learn more about this topic, watch these short videos:

Integrity – Level 1

Data Integrity – Level 2

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more