For Online E-newspaper
The East African : June 30th 2014
The EastAfrican 4 Special advertising section DATA HANDLING SOLUTION PROVIDERS IN EAST AFRICA A hacker: The increase in cyber crime also means data is not safe and needs to be secured. Pic: File JUNE 28-JULY 4, 2014 p≥otect data may be to fully educate all membe≥s of the ≥esea≥ch team about data p≥otection p≥ocedu≥es. Theft and hacking a≥e pa≥- ticula≥ conce≥ns with elect≥onic data. Many ≥esea≥ch p≥ojects involve the collection and maintenance of human subjects data and othe≥ confidential ≥eco≥ds that could become the ta≥get of hacke≥s. The costs of ≥ep≥oducing, ≥esto≥ing, o≥ ≥eplacing stolen data and the length of ≥ecove≥y time in the event of a theft highlight the need fo≥ p≥otecting the compute≥ system and the integ≥ity of the data. Elect≥onic data can be p≥o- tected th≥ough limiting access to the data; p≥otecting you≥ system by keeping updated anti-vi≥us p≥otection on eve≥y compute≥, maintaining up-todate ve≥sions of all softwa≥e and media sto≥age devices and if you≥ system is connected to the Inte≥net use a fi≥ewall. In addition lab notebooks Secure data’s the first line of defence for a business Cyber attacks have increased significantly in the past few years, leading to serious damage worldwide and making existing information and communications systems potentially vulnerable By A CORRESPONDENT The EastAfrican D Is your Data Protected Against Fire? ata is the “life blood” of any o≥ganisation, fo≥ as it flows between systems, databases, p≥ocesses, and depa≥tments, it ca≥≥ies with it the ability to make the o≥ganisation sma≥te≥ and mo≥e e≠ective. The biggest o≥ganisations pay close attention to the data asset, not as an afte≥thought but ≥athe≥ as a co≥e pa≥t of defining, designing, and const≥ucting thei≥ systems and databases. Data is essential to making well-info≥med decisions that guide and measu≥e achievement of o≥ganizational st≥ategy. O≥ganisation sometimes collects plenty of ≥aw data in fo≥ms such as questionnai≥es and su≥vey fo≥ms which may be t≥ansfe≥≥ed on pape≥ documents to manageable softcopy fo≥mats. This ≥equi≥es fast and ≥eliable data ent≥y se≥vices. The data handling p≥ovid- e≥s o≠e≥ fast, data t≥ansfe≥ and synch≥onisation solutions. In the cu≥≥ent wo≥ld of vi- ≥uses and ≥isks, data loss is a likely occu≥≥ence. E≠ective data handling p≥o- vide≥s help avoid the downtime ≥elated with such losses th≥ough data backups and ≥ecove≥ lost data. E≠ective data handling is a Fire Protection Specialists TROJAN FIRE SECURITY LTD, P.O BOX 17727 - 00500 NAIROBI - KENYA Tel: 6537456, Mobile: 0718770255, 0722704980 Email: email@example.com, firstname.lastname@example.org Website: www.trojanfire.com key pa≥t of any business’s IT st≥ategy. An eve≥ g≥owing demand f≥om p≥ivate businesses, gove≥nment agencies and institutions fo≥ mode≥n and e≠ective data management solutions have p≥ovided a vib≥ant ma≥ket fo≥ Data handling se≥vices p≥ovide≥s. Solutions that enhance safety of data allow companies to easily manage data. Businesses a≥e also able to p≥otect thei≥ image, custome≥s’ and that of pe≥sonnel, hence ≥educing and/o≥ avoiding legal c≥ises and/o≥ financial losses that a≥ise f≥om data loss o≥ data landing in the w≥ong hands Data sto≥age and backup is impo≥tant because: p≥ope≥ly sto≥ing data is a way to safegua≥d you≥ ≥esea≥ch investment; data may need to be accessed in the futu≥e to explain o≥ augment subsequent ≥esea≥ch; othe≥ ≥esea≥che≥s might wish to evaluate o≥ use the ≥esults of you≥ ≥esea≥ch; sto≥ed data can establish p≥ecedence in the event that simila≥ ≥esea≥ch is published. In o≥de≥ to maintain the in- teg≥ity of sto≥ed data, p≥oject data should be p≥otected f≥om physical damage as well as f≥om tampe≥ing, loss, o≥ theft. This is best done by limiting access to the data. PIs should decide which p≥oject membe≥s a≥e autho≥ized to access and manage the sto≥ed data. Notebooks o≥ pape≥ questionnai≥es should be kept togethe≥ in a safe, secu≥e location away f≥om public access, e.g., a locked file cabinet. P≥ivacy and anonymity can be inc≥eased by ≥eplacing names and othe≥ info≥mation with encoded identifie≥s, with the encoding key kept in a di≠e≥ent secu≥e location. Ultimately, the best way to should be sto≥ed in a safe place, compute≥ files should be backed up and the backup data sto≥ed in a secu≥e place physically ≥emoved f≥om the o≥iginal data, samples should be app≥op≥iately saved so they will not deg≥ade ove≥ time. Elect≥onic data sto≥age of- fe≥s many benefits but ≥equi≥es additional conside≥ation and safegua≥ds. Unde≥standing the flow of the data will assist in dete≥mining app≥op≥iate access cont≥ols and secu≥ity measu≥es as the data moves a≥ound. The g≥owth of inte≥disciplina≥y and c≥oss-institutional ≥esea≥ch has seen a co≥≥esponding change in the need to sha≥e data: it has become much easie≥, faste≥, and mo≥e ≥eliable than eve≥ befo≥e. One of the most costly con- side≥ations in any IT implementation is the ability to sto≥e and ≥esto≥e data. It is impo≥tant to weigh the cost of the sto≥age against the ≥isk of data loss. Using cheap desktop sto≥age without any ≥edundancy o≥ backups could end up being the most expensive choice you make. When planning sto≥age and backup a≥chitectu≥e, it is advisable to calculate sto≥age volumes by p≥ojecting a baseline and ≥ate of g≥owth fo≥ the du≥ation of the p≥oject, dete≥mine if the data is static with only pe≥iodic needs to access and/o≥ update, o≥ if the data is dynamic with f≥equent changes and updates, dete≥mine backup and ≥etention policies. Communications technology and the Inte≥net have evolved ≥apidly in the ≥ecent past and continue to b≥eak new g≥ound with the development of cloud computing. Such developments make the wo≥ld eve≥ mo≥e connected, with sensitive data ci≥culating on a publicly used, ubiquitous netwo≥k. This connectivity opens up many oppo≥tunities fo≥ cybe≥ c≥iminals, te≥≥o≥ists and hostile states. Cybe≥ attacks have inc≥eased GROWING SECTOR ONE OF THE MOST COSTLY CONSIDERATIONS IN ANY IT IMPLEMENTATION IS THE ABILITY TO STORE AND RESTORE DATA. IT IS IMPORTANT TO WEIGH THE COST OF THE STORAGE AGAINST THE RISK OF DATA LOSS. USING CHEAP DESKTOP STORAGE WITHOUT ANY REDUNDANCY OR BACKUPS COULD END UP BEING THE MOST EXPENSIVE CHOICE significantly du≥ing the last few yea≥s, leading to se≥ious damage wo≥ldwide and making existing info≥mation and communication systems potentially vulne≥able. Against this backd≥op, all count≥ies and o≥ganisations managing sensitive netwo≥k data have to develop st≥ong cybe≥ defence capabilities based on advanced technologies, p≥ocesses and t≥aining. Cybe≥ defenses a≥e well equipped to p≥ovide all the expe≥tise and solutions to help o≥ganisations p≥otect against, detect, p≥event and ≥espond to cybe≥ th≥eats. Analytics is the hea≥tbeat of data wa≥ehousing, business intelligence, and analysis. The key to getting value f≥om analytics is a solid analytics inf≥ast≥uctu≥e. Fo≥ companies in many in- dust≥ies — such as financial se≥vices, telecommunications, ≥etail, and ma≥ket ≥esea≥ch — an ente≥p≥ise business intelligence solution is a c≥itical ≥esou≥ce fo≥ decision-make≥s. To ext≥act info≥mation f≥om huge, eve≥-g≥owing databases and then tu≥n it into actionable business intelligence at the time it’s needed, howeve≥, puts eno≥mous st≥ain on t≥aditional data management systems which can cause majo≥ pe≥fo≥mance issues as mo≥e use≥s ≥un complicated, ad hoc que≥ies on la≥ge data sets. To achieve ope≥ational busi- ness intelligence, companies need solutions that can ove≥come data wa≥ehousing, data integ≥ation, and analytics challenges such as: ext≥acting ≥ealtime data f≥om multiple sou≥ces; t≥ansfo≥ming t≥aditional data into actionable business intelligence data; making the ≥esulting info≥mation accessible to those who need it and handling huge volumes of data with many use≥s making simultaneous complex ad hoc que≥ies. The data handling p≥ovid- e≥s o≠e≥s the capabilities to ove≥come these challenge and make ope≥ational business intelligence a ≥eality.
June 23rd 2014
July 7th 2014