Data Security


Data security is ensured when the confidentiality, integrity and availability of data is ensured. The term is also used synonymously with “information security.”

What does the term “data security” mean in detail?

  • Confidentiality: The data is protected against unauthorized access.
  • Integrity: The data is protected against destruction and loss.
  • Availability: The data can be accessed by authorized persons at any time.
  • 100% safety does not exist, but there are many ways to increase data security.
  • Increasing data security includes many elements, including encryption, strong passwords, cyber security, backups, and more.
  • Good basic IT protection increases data security

The clarification of where and what data exists is important for data security. Among other things, smartphones, smartwatches, removable media, clouds, email and the so-called “shadow IT” must be considered.

Where do I encounter the topic of data security in everyday work?

You face the topic of data security constantly in everyday working life. For example, every password entry and every correctly filed document is used for data security. In part, data security overlaps with the very important issues of privacy and cyber security.

What can I do to improve my safety?

Just a few examples: Confidentiality (the data is protected against unauthorized access)

  • Use encryption
  • In networks assigned staggered access rights
  • Use strong passwords
  • Delete the log-in information, receipts and accounts of former employees immediately after they leave
  • Secure jobs even in the case of short absences

Integrity (the data is protected against destruction and loss)

  • Cyber risks are reduced through employee sensitization, virus scanners, firewalls, user accounts without administrator rights, and much more
  • Regular backups, of which at least one copy is kept offline and in another location

Availability (data can be retrieved by authorized persons at any time)

  • For this, too: regular backups that are stored safely
  • Thoughtful access rights

Interesting background information

The Basic IT Protection Compendium – Edition 2019 of the Federal Office for Information
Security (BSI)

Topic Page, Data Protection and Data Security, from the IT Security Initiative in Business:

Related articles

  • Credential Stuffing

    Credential stuffing is the automated use of exposed username/password combinations to gain access to user accounts and, if necessary, to take them over completely.

    mehr lesen
  • Backup

    Backup means “reinforcement, protection” and means a backup copy in IT. For companies, backups of their computers, servers and especially the stored contents are very important, because in the case of data loss or damage, current backups allow the fastest possible return to normal operation.

    mehr lesen

Are you curious?

Test us for 30 days free of charge and without obligation.

We empower your employees to actively contribute to your company’s cybersecurity.

See for yourself how easily and quickly Perseus can be integrated into your corporate structure.

Test now for free

Do you have any questions about our services?

Do not hesitate to call: + 49 30 95 999 8080

  • Free trial period
  • Without obligation
  • Video training for cyber security and data protection with exam and certificate
  • Try our phishing simulation
  • IT security check, malware scanner, data security check and more
  • Ends automatically after 30 days