09/25/2014

When it comes to data, you often hear the words “privacy” and “security” spoken in a single phrase. But the truth is, data privacy and security are different, and require distinct actions to maintain.

Too many people take the head-in-sand approach to privacy, relying solely upon security practices to safeguard confidential information.

This leaves major privacy vulnerabilities that could have catastrophic consequences for your business.

9 critical steps to preventing a privacy breach

  1. Know where Personally Identifiable Information (PII) or Protected Health Information (PHI) is stored within your network.
  2. Reduce PII and PHI to the minimum amount necessary to support the business, or separate confidential information from the rest. 
  3. Having reduced PII and PHI, protect their locations with malware tools, firewalls and intrusion monitoring.
  4. At your network edge, employ restrictive firewalls, rulesets and advanced traffic monitoring and alerting. 
  5. Check your automatic tools to ensure alerts are acted upon and incidents recorded.
  6. Have an independent firm audit your practices and results. 
  7. Conduct a privacy breach drill designed to ensure compliance with applicable federal and state regulations and industry and international standards.
  8. Educate your employees about security and privacy risks and procedures.
  9. Make sure your people know what’s at stake.

Part of the challenge with privacy is that, while security expectations and penalties for security violations are well-defined in legal terms, privacy expectations and penalties are not always as clear.

But regardless of official penalties, what is ultimately at stake is the integrity and trustworthiness of your business.

And that’s why you and everyone at your company should take privacy very, very seriously. 

Click the button below to schedule your complimentary Data Protection Consultation now.

Contact Involta

Related Resources

BlogBlog

The Next Generation of Networks

Enter go to Blog : The Next Generation of Networks
BlogBlog

Involta Cares: Spotlight Interview with Olivia Bontrager

Enter go to Blog : Involta Cares: Spotlight Interview with Olivia Bontrager
BlogBlog

Anywhere Operations Means Business as Usual

Enter go to Blog : Anywhere Operations Means Business as Usual
BlogBlog

Your Digital Workplace with Microsoft Teams Q&A Recap

Enter go to Blog : Your Digital Workplace with Microsoft Teams Q&A Recap
BlogBlog

People Who Deliver: Spotlight Interview with Weston Shultz

Enter go to Blog : People Who Deliver: Spotlight Interview with Weston Shultz
BlogBlog

Ransomware: The Monster to Watch Out For

Enter go to Blog : Ransomware: The Monster to Watch Out For

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.