Category Archives: Blog

Protect Against a Data Security Breach, Part 2

Here are some further strategies to implement to protect against such a data security breach in your business: 4. Laptops and other portable storage media (thumbdrives, flashdrives, disks, etc) : Develop and enforce a written protocol to govern the transport of these devices outside of the office. Only transfer enough data to the device to …

Protect Against a Data Security Breach, Part 1

We are all subject to a data security breach unless we have implemented necessary protections. Any such breach can violate federal and state privacy laws with which your business must comply. A breach can have other devastating consequences, such as damage to the business’s public image and reputation, diminished client or customer confidence, financial costs …