09/25/2014

When it comes to data, you often hear the words “privacy” and “security” spoken in a single phrase. But the truth is, data privacy and security are different, and require distinct actions to maintain.

Too many people take the head-in-sand approach to privacy, relying solely upon security practices to safeguard confidential information.

This leaves major privacy vulnerabilities that could have catastrophic consequences for your business.

9 critical steps to preventing a privacy breach

  1. Know where Personally Identifiable Information (PII) or Protected Health Information (PHI) is stored within your network.
  2. Reduce PII and PHI to the minimum amount necessary to support the business, or separate confidential information from the rest. 
  3. Having reduced PII and PHI, protect their locations with malware tools, firewalls and intrusion monitoring.
  4. At your network edge, employ restrictive firewalls, rulesets and advanced traffic monitoring and alerting. 
  5. Check your automatic tools to ensure alerts are acted upon and incidents recorded.
  6. Have an independent firm audit your practices and results. 
  7. Conduct a privacy breach drill designed to ensure compliance with applicable federal and state regulations and industry and international standards.
  8. Educate your employees about security and privacy risks and procedures.
  9. Make sure your people know what’s at stake.

Part of the challenge with privacy is that, while security expectations and penalties for security violations are well-defined in legal terms, privacy expectations and penalties are not always as clear.

But regardless of official penalties, what is ultimately at stake is the integrity and trustworthiness of your business.

And that’s why you and everyone at your company should take privacy very, very seriously. 

Click the button below to schedule your complimentary Data Protection Consultation now.

Contact Involta

Related Resources

BlogBlog

People Who Deliver: Spotlight Interview with Joe Brenneman

Enter go to Blog : People Who Deliver: Spotlight Interview with Joe Brenneman
BlogBlog

Securing Your Remote Worker

Enter go to Blog : Securing Your Remote Worker
BlogBlog

Helping our Hometown Recover and Rebuild...Again: Involta HQ City of Cedar Rapids Ravaged by Derecho Storm

Enter go to Blog : Helping our Hometown Recover and Rebuild...Again: Involta HQ City of Cedar Rapids Ravaged by Derecho Storm
BlogBlog

IT Starts with Security: Lessons from Healthcare Executives

Enter go to Blog : IT Starts with Security: Lessons from Healthcare Executives
BlogBlog

Digital Transformation: How do you “Get There?”

Enter go to Blog : Digital Transformation: How do you “Get There?”
BlogBlog

Digital Transformation: Why the Risk is Worth the Reward

Enter go to Blog : Digital Transformation: Why the Risk is Worth the Reward

Stay up to date with the latest from Involta

We use cookies to offer you a better web experience? By continuing to use our website, you agree to the Privacy Policy.