09/25/2014

When it comes to data, you often hear the words “privacy” and “security” spoken in a single phrase. But the truth is, data privacy and security are different, and require distinct actions to maintain.

Too many people take the head-in-sand approach to privacy, relying solely upon security practices to safeguard confidential information.

This leaves major privacy vulnerabilities that could have catastrophic consequences for your business.

9 critical steps to preventing a privacy breach

  1. Know where Personally Identifiable Information (PII) or Protected Health Information (PHI) is stored within your network.
  2. Reduce PII and PHI to the minimum amount necessary to support the business, or separate confidential information from the rest. 
  3. Having reduced PII and PHI, protect their locations with malware tools, firewalls and intrusion monitoring.
  4. At your network edge, employ restrictive firewalls, rulesets and advanced traffic monitoring and alerting. 
  5. Check your automatic tools to ensure alerts are acted upon and incidents recorded.
  6. Have an independent firm audit your practices and results. 
  7. Conduct a privacy breach drill designed to ensure compliance with applicable federal and state regulations and industry and international standards.
  8. Educate your employees about security and privacy risks and procedures.
  9. Make sure your people know what’s at stake.

Part of the challenge with privacy is that, while security expectations and penalties for security violations are well-defined in legal terms, privacy expectations and penalties are not always as clear.

But regardless of official penalties, what is ultimately at stake is the integrity and trustworthiness of your business.

And that’s why you and everyone at your company should take privacy very, very seriously. 

Click the button below to schedule your complimentary Data Protection Consultation now.

Contact Involta

Related Resources

BlogBlog

Cloud Transformation: How and When to Make the Move

Enter go to Blog : Cloud Transformation: How and When to Make the Move
BlogBlog

People Who Deliver: Spotlight Interview with Involta's VP of Sales, Eastern Region

Enter go to Blog : People Who Deliver: Spotlight Interview with Involta's VP of Sales, Eastern Region
BlogBlog

Transformation and Growth Require That MDR Can Scale

Enter go to Blog : Transformation and Growth Require That MDR Can Scale
BlogBlog

Backup and Recovery: Safeguard Your Data

Enter go to Blog : Backup and Recovery: Safeguard Your Data
BlogBlog

Is the Future a Dangerous Place for Business?

Enter go to Blog : Is the Future a Dangerous Place for Business?
BlogBlog

Involta Launches Operation Linking Loved Ones

Enter go to Blog : Involta Launches Operation Linking Loved Ones

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.