vulnerability gives hackers incentive n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Vulnerability Gives Hackers Incentives – 9 Data Prevention & Mediation Tips PowerPoint Presentation
Download Presentation
Vulnerability Gives Hackers Incentives – 9 Data Prevention & Mediation Tips

Loading in 2 Seconds...

play fullscreen
1 / 14

Vulnerability Gives Hackers Incentives – 9 Data Prevention & Mediation Tips - PowerPoint PPT Presentation


  • 13 Views
  • Uploaded on

Data breach prevention can save you the stress, time, and costs of a data breach. The best thing you can do is ensure that your organization is following best practices for handling and protecting PII and sensitive personal information (SPI)—whether it’s digital or hard copies. The following tips could help minimize your risk.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Vulnerability Gives Hackers Incentives – 9 Data Prevention & Mediation Tips


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
vulnerability gives hackers incentive

VULNERABILITY GIVES

HACKERS INCENTIVE

9 Data Breach Prevention &

Remediation Tips

introduction

INTRODUCTION

With an average cost of $4 million per breach, up 29% since 2013,

cyber-attacks can ruin your company’s finances and reputation.

Breaches encompass a wide breadth of types and causes.

While, it may be difficult to keep a dedicated team of expert

hackers at bay, the truth is, many breaches are caused internally,

through negligence or malice. Just as important, a breach doesn’t

have to involve a computer at all. Paper-based personnel records

are a treasure trove of personally identifiable information (PII).

Data breach prevention can save you the stress, time, and costs

of a data breach. The best thing you can do is ensure that your

organization is following best practices for handling and protecting

PII and sensitive personal information (SPI)—whether it’s digital or

hard copies. The following tips could help minimize your risk.

protect your assets

PROTECT

YOUR ASSETS

routinely update security software

ROUTINELY UPDATE

SECURITY SOFTWARE

1

Often overlooked by managers

and employees alike, this may

be the most important tip on

the list.

It’s easy to click the “remind me”

button when prompted for a security

update.

However, updates ensure that your

security software can keep you safe

from the newest types of spam,

phishing, and hacking software.

slide5

2

HAVE A BREACH RESPONSE PLAN

Prevention is the best way to avoid a breach, but the sad fact is

that businesses also have to plan for when, not if the breach will

happen.

Knowing what steps to take and who needs to be notified in the event of a

breach is equally as important. Employers must share the plan with their

employees and hold mandatory training. To ensure everyone knows what to

do when disaster strikes.

What steps do we take? Who do we notify? and How much time do we have?

are just a few of the questions that arise when a breach occurs. Just like

any other disaster planning, responding to a breach should be discussed

in advance and roles assigned to cure the breach, make notifications, and

communicate with clients and/or the public.

slide6

3

ESTABLISH A CULTURE

OF CYBER SECURITY

Good leaders lead by example.

This is just as true when it comes

to establishing solid cyber security

practices.

When management understands of

Information Governance (IG) protocols

and cyber security regulations, it becomes

much easier to train employees. Password

management is a good example of this.

No one likes changing their passwords

every 90 days, but it is a necessary step in

any effective cyber security program. By

embracing this as a necessary part of doing

business, management can help drive down

that security conscious culture.

slide7

4

INFORMATION AWARENESS & DISPOSAL

Having security protocols in place is not enough on its own. Being able to

protect your information requires knowing the type of information you

have and who has access to it.

Data mapping is a important part of

managing your company’s sensitive

information. Data is a business asset and like

any other asset, businesses need to have an

inventory of what they have and where it is.

Any electronically stored sensitive

information should be encrypted and

password protected. Businesses must

properly destroy (paper/hard drive

shredding) sensitive information no longer in

use to ensure that it’s unrecoverable.

know your resources

KNOW YOUR

RESOURCES

5

Matching a storage solution with

the needs of your business is

important.

Information can be stored in a variety

of formats (digital media, Cloud, paper,

film, etc.). The best IG practices use a

combination of information solutions.

Partnering with a reputable vendor

offers both innovation and expertise,

and can provide solutions that will

not only meet your current needs,

but also assist you as you move

towards the future.

consult with a certified information governance

CONSULT WITH A CERTIFIED INFORMATION

GOVERNANCE PROFESSIONAL

6

Find the weak points in your policies and procedures with a certified

information governance professional (IGP).

Bridgett Weldner, IGP, can provide organization your organization and offer clear action

items to help you protect your information, both digital and hard copy. From annual policy

audits to data mapping, she can assist you with keeping your IG program on the right

path.

In addition, she’ll help you make sure that you’re getting the most out of your information

workflows. She can help you determine what documents are worth digitizing and what can

be permanently destroyed or stored securely off-site.

slide10

7

CSR READINESS® PROGRAM

There are two main components to our CSR Readiness offering. The first

is a concise, but thorough self-audit questionnaire that examines your

organizations policies and procedures and their susceptibility to a breach.

From there, it’ll offer you suggestions for how to improve areas where you’re vulnerable

(which our IGP can help you with by providing more in-depth guidance). Second, if you

ever do have a breach, a simple phone call will set in motion rigorous research into your

legal responsibilities for notification based on the applicable jurisdictions.

They will tell you:

1

2

3

If you must

notify

anyone

Who you

must notify

When you

must notify

them

It’s an inexpensive, indispensable service for any organization that handles PII.

document shredding and hard drive destruction

DOCUMENT SHREDDING AND

HARD DRIVE DESTRUCTION

8

Unrecoverable. That’s the

goal of shredding and

destruction.

Any information or data, on

paper or other media, which has

met its retention period, should

be permanently destroyed and

impossible to reconstruct any

meaningful information from.

That’s what our shredding

process is designed for. We are

AAA certified by the National

Association for Information

Destruction. Our shredding

services ensure that sensitive

and personal information isn’t

recoverable.

tape vaulting data protection

TAPE VAULTING &

DATA PROTECTION

9

If you have a breach, depending on

the cause, you may need to restore

from a backup.

There’s no more tried and trusted backup

than tapes. The storage size to cost ratio

can’t be beat and they’ve also earned a

reputation for long-term durability and

reliability.

By storing your tapes off-site, you’re

gaining the benefits of not co-

locating your systems and backups,

while keeping them offline in a fire-

suppressed, climate-controlled, secure

and monitored environment. With

expedited delivery options, you’re

backup tapes are always rapidly

accessible.

slide14

//

THERE’S NO SUCH THING AS

BREACH-PROOF…UNFORTUNATELY

Be wary of anyone selling anything that they claim makes you “breach-proof.” It just isn’t

that simple. But there are certainly a number of things you can do to help decrease and

minimize the risk. These tips are just some of the ways that COR365’s services can help you

avoid and prepare for a breach.

ABOUT COR365 INFORMATION SOLUTIONS

Keeping track of your company’s information can be challenging. As your business continues to grow, so does

the amount and the type of information that must be collected and stored. Without the proper resources,

protecting the ever-growing amounts of information becomes almost impossible. COR365 Information Solutions

has experienced staff who can help businesses with everything from data entry, digital document scanning,

microfilm digitization, digital document storage, and enterprise content management (ECM) to information

governance consulting, records storage and shredding services. Contact COR365 today at (336) 347-4121 or

sales@cor365.com.