Data Breach Prevention Guide

Losing data can be tremendously devastating to a company. It could compromise security, information, and jobs. Today, we will look at twelve actions that a company can take to mitigate the risks of a data breach. These twelve steps, performing a risk analysis, asset identification, and classification, attention to detail, encryption, social networking, compliance, management of personnel, least privilege, solution diversity, tracking mobile devices, data destruction, and testing are essential to helping a company’s security program.

 

1)  Perform a risk analysis

An information security risk assessment is the process of identifying vulnerabilities, threats, and risks associated with organizational assets and the controls that can mitigate these threats. Risk managers and organizational decision makers use risk assessments to determine which risks to mitigate using controls and which to accept or transfer.

2)  Asset identification and classification

 

3)  Attention to detail

 

4)  Encryption

 

5)  Social networking

 

6)  Comply with regulations and standards

 

7)  Manage Personnel

 

8)  Least privilege

 

9)  Solution Diversity

 

10)  Track mobile devices

 

11)  Destroy old documents, data, and hardware

 

12)  Test the system

 

 

 



About The Author


Eric Vanderburg

Eric Vanderburg is an author, thought leader, and consultant. He serves as the Vice President of Cybersecurity at TCDI and Vice Chairman of the board at TechMin. He is best known for his insight on cybersecurity, privacy, data protection, and storage. Eric is a continual learner who has earned over 40 technology and security certifications. He has a strong desire to share technology insights with the community. Eric is the author of several books and he frequently writes articles for magazines, journals, and other publications.

2 Comments

Leave a Reply