Comment It's situation specific (Score 1) 213
Start by evaluating what you have and whom you wish to keep it away from. If you have classified data that a national security apparatus wants, do what a poster up-thread suggested and keep it offline (also, stay the hell away from me). If your data is less sensitive, then evaluate your security posture using a multi-tiered approach. Assume all routers can be compromised and treat them as the first line of defense. Evaluate where you data sits (cloud based versus local) and how it is transferred (encrypted versus non). Evaluate your own work flows in determining how the data is potentially vulnerable.
You can build your own fortress unto yourself if you want to, but at the end of the day even if you're sharing with other fortress entities you will still end up having to send data across untrusted lines. Some of those lines are run by people who don't have your privacy interests at heart. So knowledge and common sense are still your best defenses.
You can build your own fortress unto yourself if you want to, but at the end of the day even if you're sharing with other fortress entities you will still end up having to send data across untrusted lines. Some of those lines are run by people who don't have your privacy interests at heart. So knowledge and common sense are still your best defenses.