09/25/2014

When it comes to data, you often hear the words “privacy” and “security” spoken in a single phrase. But the truth is, data privacy and security are different, and require distinct actions to maintain.

Too many people take the head-in-sand approach to privacy, relying solely upon security practices to safeguard confidential information.

This leaves major privacy vulnerabilities that could have catastrophic consequences for your business.

9 critical steps to preventing a privacy breach

  1. Know where Personally Identifiable Information (PII) or Protected Health Information (PHI) is stored within your network.
  2. Reduce PII and PHI to the minimum amount necessary to support the business, or separate confidential information from the rest. 
  3. Having reduced PII and PHI, protect their locations with malware tools, firewalls and intrusion monitoring.
  4. At your network edge, employ restrictive firewalls, rulesets and advanced traffic monitoring and alerting. 
  5. Check your automatic tools to ensure alerts are acted upon and incidents recorded.
  6. Have an independent firm audit your practices and results. 
  7. Conduct a privacy breach drill designed to ensure compliance with applicable federal and state regulations and industry and international standards.
  8. Educate your employees about security and privacy risks and procedures.
  9. Make sure your people know what’s at stake.

Part of the challenge with privacy is that, while security expectations and penalties for security violations are well-defined in legal terms, privacy expectations and penalties are not always as clear.

But regardless of official penalties, what is ultimately at stake is the integrity and trustworthiness of your business.

And that’s why you and everyone at your company should take privacy very, very seriously. 

Click the button below to schedule your complimentary Data Protection Consultation now.

Contact Involta

Related Resources

BlogBlog

Business Anglers Beware: The Phish Are Biting

Enter go to Blog : Business Anglers Beware: The Phish Are Biting
BlogBlog

Stop Attacks with Involta Air Gap

Enter go to Blog : Stop Attacks with Involta Air Gap
BlogBlog

How to Create a Solid Strategic Plan

Enter go to Blog : How to Create a Solid Strategic Plan
BlogBlog

Involta Cares: Spotlight Interview with Tracy McNally

Enter go to Blog : Involta Cares: Spotlight Interview with Tracy McNally
BlogBlog

People Who Deliver: Spotlight Interview with Emma Sedrel

Enter go to Blog : People Who Deliver: Spotlight Interview with Emma Sedrel
BlogBlog

People Who Deliver: Spotlight Interview with Michaela Recker

Enter go to Blog : People Who Deliver: Spotlight Interview with Michaela Recker

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.