Secure Magazine Limited
  • Home
  • Security – in Services
    • Security in ICT
    • Security in Education
    • Security in Transport & Travel
  • Case Study
  • Security – in Products
    • CCTV Surveillance
    • Access Control
    • Detectors and Scanners
    • Burglar Alarms and Systems
    • Intercoms
    • Gate Motors
    • Perimeter Protection
    • Fire Equipment and Protection
  • About
  • Buy / Free Magazine Download
Facebook Twitter Instagram
Trending
  • Security Products and System Consultancy
  • Building Sustainable Security Sector Capacity in Africa
  • Civillian Response: Preparing to Enter Scene of Crime
  • Are you looking for Access Control System? Factors to Consider
  • GPS Tracking Systems For Better Fleet Security
  • Key Solutions in Addressing Security Concerns in Hotels
  • Is CCTV Surveillance a Blessing or a Threat?
  • Video Surveillance and Its Contribution Towards Achieving a 24-Hour Economy
Facebook Twitter Instagram
Secure Magazine LimitedSecure Magazine Limited
Hikvision Kenya Security Products, Systems
  • Home
  • Security – in Services
    • Security in ICT
    • Security in Education
    • Security in Transport & Travel
  • Case Study
  • Security – in Products
    • CCTV Surveillance
    • Access Control
    • Detectors and Scanners
    • Burglar Alarms and Systems
    • Intercoms
    • Gate Motors
    • Perimeter Protection
    • Fire Equipment and Protection
  • About
  • Buy / Free Magazine Download
Secure Magazine Limited
Home»General Business Security»Keeping Confidential Business Information Secure
General Business Security

Keeping Confidential Business Information Secure

mcihvBy mcihvAugust 14, 2015No Comments2 Views
Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

In every business entity, there is some information that is considered to be of sensitive nature. This
includes employee and customer data. To keep such information safe, the following simple steps will come in handy: Take an inventory of all data capture and storage assets You can take stock of information assets in the following five ways:

i. Know which equipment helps in data capture

By having an in-depth knowledge of all your information assets and the way you access it, you will be in a perfect position to know areas where you are vulnerable. Take inventory of computers, servers, disks and flash drives. Include in your stock list cell phones and laptops. You also need to know all employee email
addresses including those of employees who have recently stopped working with the company.

ii. Interview people who handle information

Form a habit of seeking for updates from personnel in human resources, accounts and customer service as well as those in IT. Customer feedback can also be a good source of business information. Out of such briefings, you can get to find out where sensitive data comes from. It could be from customers, call centers,
banks, credit card companies and contractors.

iii. Analyze forms of data flow

Business forms will help you understand the way sensitive data is transmitted to your company. Define which data comes in through your company’s website, emails and postal mail. On the other hand, find out the kind of information each of these sources transmits. It could be customer checking account numbers or credit card information.

iv. Investigate data accessibility

This involves knowing which people can and do access company data. Find out whether every employee can access any data or there are restrictions. Query whether software and data equipment vendors can be able to access credit card information or transactions. Where your business works with outsourced contractors, find out what their security clearance levels are.

v. Revisit data storage processes

Data comes in different ways each posing its own risks. You need to pay keen attention to the ways your
business handles personal information such as identification card numbers, credit card numbers, bank
details and other financially related information. Ask yourself the extent to which such data can be used to
facilitate theft. Keep what you need only Protecting customer and employee data helps maintain their integrity and that of your business. As a rule of thumb, always keep only the data that you need.

Get rid of unwanted data by:

i. Elimination

There is absolutely no need to gather personal information if it will be of no use to your business. Soon
after gathering information of any nature, ensure that there are defined ways of storing, archiving, protecting and disposing it off. Avoid gathering data just for the sake of it. Review data collection forms and revise them on a regular basis such that they always remain relevant.

ii. Archival

If there is no justification for retaining information, do not retain it. By keeping such sensitive data with you, it creates opportunity for fraud. Archive what you need and dispose the rest.

iii. Changing software defaults

At times, you might be using software whose default settings store any data captured permanently. Check
these settings and adjust them accordingly.

iv. Ensuring compliance

Your company must be compliant with existing security and privacy requirements as recognized by law.

v. Defining retention requirements

If there is a requirement for you to keep personal and business information, do so under the guidance of a
record retention policy. The policy must state the type of information, how long it must be kept, who can access it and ways of disposal upon redundancy.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
mcihv
  • Website

Related Posts

Building Sustainable Security Sector Capacity in Africa

August 17, 2019

Civillian Response: Preparing to Enter Scene of Crime

August 16, 2019

Key Solutions in Addressing Security Concerns in Hotels

September 29, 2015

Leave A Reply Cancel Reply

Secure Digital Limited Hikvision Kenya
SECUREXPO EAST AFRICA
PROSAK
Hikvision
© 2023 Secure Magazine Limited. Designed by TSL.

Type above and press Enter to search. Press Esc to cancel.