How Secure is Your Data?

Written By: Karen Hall | Apr 2, 2018 12:00:00 AM





Karen Hall is Account Strategist for Roux, a creator of rich, creative solution for marketing strategy. Click here to see the original article

Did you know that most data breaches are opportunistic rather than targeted? I certainly didn’t until I attended a technology conference and learned so much during a session on the topic of cyber security. I am sharing some of the things I learned but all credit goes to the SMC3 conference and the panelists. 

Cyber security is:

  • People
  • Processes
  • Technology

It is NOT just technology! Many companies think it is just technology and do not know what to do or how to respond when a breach occurs.

In the event of a breach or hack:

  • You needed to have a back up regimen in place
  • You need cyber security liability coverage
  • You need to know if you have a recent back up or can rebuild from other sources
  • Implement your disaster recovery plan – preparation is key
    • Concise PR plan
    • No panic
  • Do not hesitate to contact law enforcement (this does not mean all breach details are then a matter of public record)

You need to determine what information is proprietary/confidential to your company and make sure it is up to date, accurate and protected. Determining what data to protect is very important.

A bit about breaches:

  • Average dwell time is 270 days – the person/organization has been in your system for 9 months before the breach is discovered.
  • The vast majority of breaches are opportunistic rather than targeted.
  • Breaches can happen through vendors/partners who have access to your data so you need to make sure they are following the data protection protocol that you have in place.

Policy vs. practice

You MUST be doing what you think you are doing! Does your practice match your policy? If it doesn’t and that’s discovered after a breach your insurance will not pay or if they discover during an investigation after they pay they will sue you and get their money back.

Good people are nice and want to be helpful. That is not always a good thing. Two quick examples:

  • An employee allowed access to the company’s server room because the person had a plausible reason to enter even though the company policy is to not allow people into areas with sensitive data at all.
  • A badly brown spray-painted truck (meant to look similar to a UPS vehicle) was allowed into a warehouse dock area with no questions asked.

Effective cyber security is essential in today’s online world. How we protect our own data, customer data and partner data will likely continue to become more complex. First things first, as we like to say at roux, what data of ours and yours needs to be protected?

Interested in learning more about this topic?
Join TMSA
 and visit the Members Only Section for more valuable resources or whitepapers.
And check out the TMSA Blog for more related articles!

Tags:

Keep Reading

Strategy

Coronavirus and Your Workplace

Addressing Sick Leave, FMLA, Pay, Privacy, and Actions You Need to Take By Terri L. Dougherty, PHR, SHRM-CP, J. J. Keller & Associates, Inc. The outbreak of coronavirus disease 2019 (COVID-19)...

Strategy

Until Sales & Marketing Have the Same Goal They'll Never Get Along

By Jeff Davis, Founder of The Sales and Marketing Alignment Summit and The Alignment Podcast. Davis will be the keynote speaker at the upcoming 2018 TMSA Logistics Marketing & Sales Conference, June...

Sales

Help Me Understand - Hank Williams (Driving Sales Output)

By Andrew Gulovsen, Director of Business Development, TranStrategy Partners, Inc. During a conversation with a 2nd generation owner of a transportation firm located outside of Baltimore, a point was...