fbpx Skip to main content

A Short Guide to Data Security Practices for Your Business

By August 28, 2017December 13th, 2017Security
Data security practices

Much has been said about data security practices and cybersecurity measures that businesses should follow. All the information and recommendations out there can be confusing and overwhelming. Large data breaches and multiple scary ransomware attacks have dominated the news for years now. Each time businesses have to ask, “Should we be worried? Are we a target? What can we do to defend ourselves?” So here’s a short beginner’s guide on keeping your data safe and your risks low.

#1 Don’t ask for information you don’t need

Don’t ask for and don’t hold confidential information “just because”. If you don’t store Personally Identifiable Information (PII) or collect other sensitive, confidential data, you don’t have to worry so much about protecting it. Do you really need to ask for Social Security numbers? Do you need a customer’s full birth date? Ask yourself what is truly appropriate and necessary for each situation. By reducing the amount of unnecessary sensitive information you ask for, you can reduce your risks and your liability in case of a data breach.

#2 Secure your data

There are three questions to address when securing the data you’ve collected.

  • Do you need to keep sensitive data?
  • Is your data shared responsibly?
  • Are you storing data securely?

Do you need to keep it?

First, cyber attackers expect you to keep everything you’ve collected, whether you need to hang on to it or not. Why? Because this sloppy policy is very common and gives attackers an easy goldmine of confidential data to hack and exploit – data that businesses may not even remember they have and need to secure! Disappoint hackers and reduce your security risks right away with a policy to review, assess, and dispose of data regularly. If you don’t have a legitimate business need for confidential information, get rid of it.

  1. Periodically review your stored data. What do you have?
  2. Assess what data you need to maintain. Are you using the data?
  3. Securely dispose of unneeded, unnecessary data.

Do you need to share it?

Second, don’t use confidential information in inappropriate contexts. Don’t overshare. You will need to collect and store sensitive data for some things, such as hiring new employees and maintaining customer accounts. But be aware of what you’re sharing with your vendors, partners, contractors, employees, and customers. Do these audiences need to see all the information, or just a relevant part? Have you combined information in a way that makes people identifiable?

Some tips:

  • Before sharing documents, always review them for Personally Identifiable Information (PII). Remove information such as Social Security numbers, birth dates, and financial information.
  • Delete sensitive information from spreadsheets before sharing them with recipients who should not see that information.
  • Don’t use real documents or real customer files as mockups or samples.

Did you store it securely?

Third: You know what sensitive data you have. You know what you need. You know where it is. But is it secured? One of the best ways to secure data is to strictly control who has access to it.

Not all of your employees need unrestricted access to all your data and confidential information. Grant your users access to only the data they need for their jobs. Restrict administrative access to just a few key, trusted personnel.

For example:

  • Employees who do not use sensitive data gathered during the hiring process should not be able to access those records.
  • Documents with sensitive information should be locked away physically and out of sight with a “clean desk” policy.
  • Shared workstations should have separate password-protected logins for each user.
  • Immediately close and remove user accounts and password-protected logins for former employees.
  • Periodically review all user accounts and permissions to clean up any defunct accounts or unnecessary access.
  • Update your business’s policies and procedures to include security steps, especially when hiring, onboarding, training, and offboarding employees.

And finally, as is always important, secure your systems and data with strong passwords, a good password storage policy, and multi-factor authentication.

#3 Train your employees to follow data security policies

And finally, do your employees know how to keep your data secure? Are they aware of your data security practices? Can they recognize a phishing scam in their inbox? Do they know what Personally Identifiable Information (PII) is, and how they should and should not use it?

To effectively enforce any data security policies and procedures you put in place, your employees need to be educated. Your employees are the #1 greatest risk to your security, but they can also be your #1 defense against attacks. So train all employees – new, old, part-time, full-time, seasonal, and temps – on the standards and policies you expect them to uphold.

Consider regularly updated online security awareness training for all your employees to help them understand cyber threats and how to recognize and deal with them. You can also go one step further and invest in interactive training with regular tips, phishing attack tests, and more.

But also remember: A culture of good data security practices starts at the top. Managers, supervisors, and leaders in your organization need to demonstrate smart, sensible security measures in order to create a culture of security.[/vc_column_text][/vc_column][/vc_row]


Recent Posts / View All Posts

Compliance

IT Compliance and Why It Is Important for Your Business

| Business Productivity, Managed Services, Security | No Comments
In running a business, there are a lot of important matters that need to be taken care of. Even if they are not really in line with the core competencies of the business. One such matter is IT compliance. In the last few weeks, we have been talking about compliance and how it is important to your business. What Is IT Compliance? One of our recent blogs gives a brief but enlightening overview of what IT compliance is all about. In a nutshell, it is the process of complying with the rules, regulations and requirements set by a third party, which aim…
Achieving Compliance

Achieving Compliance as a Team

| Business Productivity, Security | No Comments
Before your company can fully comply with all the requirements set by third parties like regulatory bodies and clients, there are dozens upon dozens of tasks that need to be completed. These tasks are spread across different areas of the company and are impossible for just one individual to accomplish. The process of achieving compliance would require a fast and thorough team of compliance specialists. Vital Matters to Discuss when achieving compliance In most cases achieving compliance failures can be attributed to a lack of planning and communication. To avoid these problems, bring your compliance team together right from the…
IT Security

What Is IT Security and IT Compliance?

| Business Productivity, Security, Tech Tip | No Comments
IT security and IT compliance are two essential matters for any business or organization. Many people think they are the same, while others frequently confuse one for the other. They are not the same thing, but when implemented together, they can provide maximum digital safety and minimize the risk of data breaches and other online threats. In this article, we’ll explain which is which and why both require your attention. What Is IT Security? As the term implies, IT security refers to ensuring the security of a company’s or organization’s IT infrastructure. When creating a security strategy for your business,…