Posts tagged "Best Practices"

Paper Document Shredders: Fellowes Tears it Up!

fellowes-shredderFellowes Powershred

Who cares about document shredders in a digital world? You should. We were supposed to have gone paperless by now, right? Rubbish. Paper rubbish, in fact.

You and I both know that we use as much paper as ever. We sign up for electronic statements and then print and file them, along with important emails, financial documents, etc. Paper documents are more plentiful than ever, and they pose a significant risk of workplace identity theft and data breach.

According to a recent study conducted by the ASBI: 80% of large organizations surveyed indicated that they had experienced one or more data breaches over the previous 12 months. 49% of those breaches involved the loss or theft of paper documents. The average breach recovery cost $7.2 Million!

Many businesses fail to realize is that paper documents pose just as much of a risk to an organization as electronic documents.

Posted in Identity Theft Prevention, Product Endorsements by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

Data Breach Protection: Laptop Theft Best Practices

laptop-theft
image-810
Laptop theft and mobile data theft (tape backups, iPhones, BlackBerries, USB drives) account for nearly half of the cases of serious corporate data breach and workplace identity theft. Your corporation’s data breach protection will be significantly improved by educating your staff on the following mobile data best practices:

Before you save sensitive data to any mobile device, it is your responsibility to:

  • Determine if your organization allows you to remove the data in question from the office in the first place. Are you allowed to save that database, Excel file, Word document, customer list, employee record, intellectual capital, etc. on your laptop, thumb drive or other mobile device?
  • Decide if it is absolutely necessary to remove it from the more highly-controlled and secure environment of the office. In many of the major cases of reported data breach, the data stored on the mobile device did not actually need to be there in the first place.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,