Article

Data Security is Mandatory

Topic: Identity TheftBy Dovell BonnettPublished Recently added

Legacy signals

Legacy popularity: 1,012 legacy views

What is a data breach? A data breach occurs when customer information held by a company, business or institution is accessed, used, collected, retained or disclosed in a manner which is not in accordance with the applicable privacy laws and regulations and/or the company's own policies regarding customer information and privacy.

Regardless of whether the information in question has been obtained by accessing an unprotected computer network or by digging through documents which have not been properly disposed of - the threat is the same. If customer information is accessed or disclosed without the consent of customers, your company has experienced a data breach. In 40 states, data security laws require that companies contact and notify every current and potential customers, as well as employees and vendors of the data breach. So what exactly puts your company at risk by violating good data security practices?

Some common violations of poor data security practices include having file cabinets accessible areas and unlocked when not in use. After hours fax orders (which will contain sensitive customer information) left unattended in open areas. A lost or stolen computer or thumb drive which contains unencrypted files is another example. Even throwing sensitive documents in the recycle bin (security trumps green). There are in fact many different areas of vulnerability in any company, including yours where data thieves have an opportunity to gain access to your corporate records. As a business owner, you are legally required to maintain data security - and notify customers should a data breach happen.

Your company stands to lose a lot in the event of a data breach - you can count on losing as many as half of your customers ove
ight and this kind of bad press isn't going to just disappear anytime soon. Implementing good data security measures at your company can keep your company protected from acquiring a bad reputation for security and losing a significant portion of your business. Some industry estimates has the average 2008 average cost of a breach at $6.7 million per incident. Remember that it is often the smallest things which can cause big losses. Every part of the data security puzzle is important.

Data thieves have access to all of the same kinds of technology as you do and will use them, along with a multitude of more low-tech methods in their efforts to access your sensitive data. The smartest thieves will use multiple techniques to attack your company - going after the employees, the network, the computers and the building itself. All of these areas are vulnerabilities which need to be addressed and each presents its own different set of challenges.

Article author

About the Author

Headquartered in Ladera Ranch, Califo
ia, Access Smart, LLC reduces the cost and burden of network and internet security on employees, IT administrators and business owners. Dedicated to empowering businesses and consumers to securely regain control over their digital information, Access Smart offers low cost, highly secure, integrated hardware and software packages that securely manage important data over wired and wireless networks, computers, Point-of-Sale devices, kiosks, and any other device that can accept and communicate via smartcard technology.

Further reading

Further Reading

4 total

Article

It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...

Related piece

Article

On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...

Related piece

Article

The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.

Related piece

Article

Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner

Related piece