Only Keep the Data You Need
If you donâ€
t Use Sensitive Data as
needs to set up procedures that prevent sensitive data being used as unique
When you have sensitive physical records, restrict physical access to them. This may be in a locked storage cabinet or locked room, and only those who need the information should be able to access the records.
The same should
be true of your IT systems. Only those who need to be able to see customersâ€
There are a number of ways to limit risk. Not letting people view sensitive company data on unsecured personal devices is one way. Another is prohibiting file sharing services or use of personal software on work computers since this opens up the door to malware getting onto your IT infrastructure.
You can set policies that limit risk, like timing out users after a set period of inactivity, requiring passwords to be reset periodically, and deactivating user accounts as soon as someone leaves the company. Restrict telecommuting to company-controlled computers that have the approved anti-virus and anti-malware software on it. And train employees never to leave company laptop computers and tablets lying around.
Destroy Before Disposal
Keep Your Defenses Up
Keep your security patches up to date on all computers. Have IT maintain firewalls, anti-virus software, and anti-spyware software on the network and make IT security a priority.
Take action now
to minimize the odds of a data breach. Follow our advice, and youâ€