• IT intelligence from a national leader.

  • IT intelligence from a national leader.

  • IT intelligence from a national leader.

Involta Blog

Preventing Privacy Breaches: 9 Critical Steps


When it comes to data, you often hear the words “privacy” and “security” spoken in a single phrase. But the truth is, data privacy and security are different, and require distinct actions to maintain.

Too many people take the head-in-sand approach to privacy, relying solely upon security practices to safeguard confidential information.

This leaves major privacy vulnerabilities that could have catastrophic consequences for your business.

9 critical steps to preventing a privacy breach

  1. Know where Personally Identifiable Information (PII) or Protected Health Information (PHI) is stored within your network.
  2. Reduce PII and PHI to the minimum amount necessary to support the business, or separate confidential information from the rest. 
  3. Having reduced PII and PHI, protect their locations with malware tools, firewalls and intrusion monitoring.
  4. At your network edge, employ restrictive firewalls, rulesets and advanced traffic monitoring and alerting. 
  5. Check your automatic tools to ensure alerts are acted upon and incidents recorded.
  6. Have an independent firm audit your practices and results. 
  7. Conduct a privacy breach drill designed to ensure compliance with applicable federal and state regulations and industry and international standards.
  8. Educate your employees about security and privacy risks and procedures.
  9. Make sure your people know what’s at stake.


Part of the challenge with privacy is that, while security expectations and penalties for security violations are well-defined in legal terms, privacy expectations and penalties are not always as clear.

But regardless of official penalties, what is ultimately at stake is the integrity and trustworthiness of your business.

And that’s why you and everyone at your company should take privacy very, very seriously. 

Click the button below to schedule your complimentary Data Protection Consultation now.

Schedule your complimentary   Data Protection Consultation now





Topics: security, IT management, compliance, privacy