9 Data Prevention & Mediation Tips


Presentation Description

Data breach prevention can save you the stress, time, and costs of a data breach. The best thing you can do is ensure that your organization is following best practices for handling and protecting PII and sensitive personal information (SPI)—whether it’s digital or hard copies. The following tips could help minimize your risk.


Presentation Transcript

slide 1:

VULNERABILITY GIVES HACKERS INCENTIVE 9 Data Breach Prevention Remediation Tips

slide 2:

With an average cost of 4 million per breach up 29 since 2013 cyber-attacks can ruin your company’s fnances and reputation. Breaches encompass a wide breadth of types and causes. While it may be difcult to keep a dedicated team of expert hackers at bay the truth is many breaches are caused internally through negligence or malice. Just as important a breach doesn’t have to involve a computer at all. Paper-based personnel records are a treasure trove of personally identifable information PII. Data breach prevention can save you the stress time and costs of a data breach. The best thing you can do is ensure that your organization is following best practices for handling and protecting PII and sensitive personal information SPI—whether it’s digital or hard copies. The following tips could help minimize your risk. INTRODUCTION

slide 3:


slide 4:

Often overlooked by managers and employees alike this may be the most important tip on the list. It’s easy to click the “remind me” button when prompted for a security update. However updates ensure that your security software can keep you safe from the newest types of spam phishing and hacking software. ROUTINELY UPDATE SECURITY SOFTWARE 1

slide 5:

Prevention is the best way to avoid a breach but the sad fact is that businesses also have to plan for when not if the breach will happen. Knowing what steps to take and who needs to be notifed in the event of a breach is equally as important. Employers must share the plan with their employees and hold mandatory training. To ensure everyone knows what to do when disaster strikes. What steps do we take Who do we notify and How much time do we have are just a few of the questions that arise when a breach occurs. Just like any other disaster planning responding to a breach should be discussed in advance and roles assigned to cure the breach make notifcations and communicate with clients and/or the public. HAVE A BREACH RESPONSE PLAN 2

slide 6:

Good leaders lead by example. This is just as true when it comes to establishing solid cyber security practices. When management understands of Information Governance IG protocols and cyber security regulations it becomes much easier to train employees. Password management is a good example of this. No one likes changing their passwords every 90 days but it is a necessary step in any efective cyber security program. By embracing this as a necessary part of doing business management can help drive down that security conscious culture. ESTABLISH A CULTURE OF CYBER SECURITY 3

slide 7:

Data mapping is a important part of managing your company’s sensitive information. Data is a business asset and like any other asset businesses need to have an inventory of what they have and where it is. Any electronically stored sensitive information should be encrypted and password protected. Businesses must properly destroy paper/hard drive shredding sensitive information no longer in use to ensure that it’s unrecoverable. INFORMATION AWARENESS DISPOSAL 4 Having security protocols in place is not enough on its own. Being able to protect your information requires knowing the type of information you have and who has access to it.

slide 8:

Matching a storage solution with the needs of your business is important. Information can be stored in a variety of formats digital media Cloud paper flm etc.. The best IG practices use a combination of information solutions. Partnering with a reputable vendor ofers both innovation and expertise and can provide solutions that will not only meet your current needs but also assist you as you move towards the future. KNOW YOUR RESOURCES 5

slide 9:

Find the weak points in your policies and procedures with a certifed information governance professional IGP. Bridgett Weldner IGP can provide organization your organization and ofer clear action items to help you protect your information both digital and hard copy. From annual policy audits to data mapping she can assist you with keeping your IG program on the right path. In addition she’ll help you make sure that you’re getting the most out of your information workfows. She can help you determine what documents are worth digitizing and what can be permanently destroyed or stored securely of-site. CONSULT WITH A CERTIFIED INFORMATION GOVERNANCE PROFESSIONAL 6

slide 10:

There are two main components to our CSR Readiness ofering. The frst is a concise but thorough self-audit questionnaire that examines your organizations policies and procedures and their susceptibility to a breach. From there it’ll ofer you suggestions for how to improve areas where you’re vulnerable which our IGP can help you with by providing more in-depth guidance. Second if you ever do have a breach a simple phone call will set in motion rigorous research into your legal responsibilities for notifcation based on the applicable jurisdictions. They will tell you: CSR READINESS® PROGRAM 7 It’s an inexpensive indispensable service for any organization that handles PII. 1 2 3 If you must notify anyone Who you must notify When you must notify them

slide 11:

Unrecoverable. That’s the goal of shredding and destruction. Any information or data on paper or other media which has met its retention period should be permanently destroyed and impossible to reconstruct any meaningful information from. That’s what our shredding process is designed for. We are AAA certifed by the National Association for Information Destruction. Our shredding services ensure that sensitive and personal information isn’t recoverable. DOCUMENT SHREDDING AND HARD DRIVE DESTRUCTION 8

slide 12:


slide 13:

By storing your tapes of-site you’re gaining the benefts of not co- locating your systems and backups while keeping them ofine in a fre- suppressed climate-controlled secure and monitored environment. With expedited delivery options you’re backup tapes are always rapidly accessible. TAPE VAULTING DATA PROTECTION 9 If you have a breach depending on the cause you may need to restore from a backup. There’s no more tried and trusted backup than tapes. The storage size to cost ratio can’t be beat and they’ve also earned a reputation for long-term durability and reliability.

slide 14:

Be wary of anyone selling anything that they claim makes you “breach-proof.” It just isn’t that simple. But there are certainly a number of things you can do to help decrease and minimize the risk. These tips are just some of the ways that COR365’s services can help you avoid and prepare for a breach. THERE’S NO SUCH THING AS BREACH-PROOF…UNFORTUNATELY ABOUT COR365 INFORMATION SOLUTIONS Keeping track of your company’s information can be challenging. As your business continues to grow so does the amount and the type of information that must be collected and stored. Without the proper resources protecting the ever-growing amounts of information becomes almost impossible. COR365 Information Solutions has experienced staf who can help businesses with everything from data entry digital document scanning microflm digitization digital document storage and enterprise content management ECM to information governance consulting records storage and shredding services. Contact COR365 today at 336 347-4121 or salescor365.com. //

authorStream Live Help