Is your company’s data truly secure? Even after the basic security protocols, like a firewall, data encryption, and backups are in place, most companies still need to patch a few holes in the system that could let cyber criminals in.
Here are some vulnerabilities that many companies share. Run through this list to make sure you’re not jeopardizing your company’s data.
Not Vetting Vendors
Never take it for granted that the vendors you share data with are taking security as seriously as you are. Any vendor who handles, stores, or transmits your data could create a vulnerability for you. Have your IT security expert prepare a questionnaire about data encryption, hardware, and other security issues that you can use to gather information from your current vendors and incorporate into your RFP process going forward. Schedule regular security audits with your vendors as well.
Lax Employee Password Behavior
Have you ever been inside a business and seen an employee’s passwords written on sticky notes and scattered around their monitor? Your secure system is meaningless if the employees outside your IT department don’t understand why security is vital. Talk to them about safeguarding their passwords, changing them regularly, and never sharing or entering a password in response to an e-mail or phone call, no matter how official it may seem.
Also talk with them often about which information they must never share via e-mail, and why they should never let anyone into the secure areas of your building unless they know exactly who that person is.
Not Securing Cloud-Based Apps
When you use cloud-based apps to share data with your team, that data is at risk. Even if the app itself is locked down, it’s still your responsibility to use the app wisely and engage the proper security settings. For instance, Slack is a popular team communication app that needs to be well-managed to be secure.
More than 18 percent of the files uploaded by users of the Slack app contain sensitive information. It’s important to inventory the data you’re sharing and categorize it according to security levels, implement appropriate access controls, and watch vigilantly for insider threats and compromised accounts.
Not Having an Ongoing Plan
Who is responsible for re-issuing passwords when an employee leaves the company? What kind of plan do you have for keeping your employees conscious of how they’re handling data and passwords? Who in your company is responsible for making sure your security practices keep up with changing standards? Data security is not a set-it-and-forget-it function to be checked off a task list. Without regular attention and upkeep, your security plan inevitably becomes threadbare and develops weaknesses.
Data security is a tough reality in today’s connected business environment. It’s tempting to set up minimal security rules and devote as little time and resources to the issue as possible. But a breach causes an expensive, monstrous disruption in your business and could even destroy your company. It’s wise to devote abundant resources and time to prevention and security.
Recent Comments