Tips to Help Prevent Identity and Data Theft
by Terri Eyden on
By Mark Burnette, LBMC Director of Security and Risk Services
Information security is a 24-7, year-round job. Failing to properly monitor and respond to threats in real time exposes organizations, clients, and business partners to risks that could do significant harm to their companies.
Following are three tips to help companies reduce the risk of data theft and to keep their IT systems and sensitive information from being compromised:
1. First, companies should determine WHAT sensitive data they have. To do this, take the time to identify and catalog sensitive data within your organization. Once you have a list of the types of sensitive data and where it is stored, processed, and transmitted within the company, you can determine the threats to that data and make sure you have the controls and protections in place to help secure it.
2. Once organizations have identified what data to protect, they need to determine HOW susceptible it is to compromise. A penetration test can help you determine the technical vulnerability of your IT environment (and sensitive data). This type of test helps to validate the security measures that your company may already have in place and to identify the remaining holes that could lead to data compromise.
3. Make sure that company personnel understand their responsibility to protect sensitive information. Many compromises occur because a well-meaning employee sends sensitive data via unencrypted e-mail or clicks on a link in a phishing scam. Take a few minutes this month to send a companywide e-mail to remind employees to be vigilant when receiving unexpected messages and inquiries, and to be aware of the company's policies regarding the handling of sensitive data when their job duties require them to store, process, or transmit such information. Also, be sure that your company's internal training includes a module on protecting sensitive data and complying with security policies. Once training has occurred, companies should periodically evaluate the effectiveness of the training by performing "social engineering tests" to assess the awareness and vigilance of personnel, and then adjust training programs based on the results of the tests.
Most organizations have a limited amount of money and people resources to dedicate to information security and data protection. Before you spend a dollar of your organization's money on security tools or products, make sure they will address the areas that present the highest risk. This approach ensures that all money spent on security is justifiable and appropriate.
LBMC Security & Risk Services, a division Lattimore Black Morgan & Cain, PC, has experienced tremendous growth during the past few years, as it has helped companies combat the increasing threat of data and identity theft. LBMC's risk services team can help you assess your risks and ensure that your security efforts produce the greatest benefit and have the most effective impact. For more information, visit www.lbmcsecurity.com.
You may like these other stories...
How are you planning? What tools do you use (or fail to use) for forecasting? PlanGuru is a business budgeting, forecasting, and performance review software company based in White Plains, N.Y. AccountingWEB recently spoke...
Event Date: October 30, 2014, 2 pm ETMany Excel users have a love-hate relationship with workbook links. For the uninitiated, workbook links allow you to connect one Microsoft Excel spreadsheet to other spreadsheets, Word...
Event Date: September 9, 2014, 2:00 pm ETIn this session we'll discuss the types of technologies and their uses in a small accounting firm office. Included will be:The networked office: connecting everything together for...
Upcoming CPE Webinars
Meet budgets and client expectations using project management skills geared toward the unique challenges faced by CPAs. Kristen Rampe will share how knowing the keys to structuring and executing a successful project can make the difference between success and repeated failures.
This webcast will include discussions of recently issued, commonly-applicable Accounting Standards Updates for non-public, non-governmental entities.
Excel spreadsheets are often akin to the American Wild West, where users can input anything they want into any worksheet cell. Excel's Data Validation feature allows you to restrict user inputs to selected choices, but there are many nuances to the feature that often trip users up.
In this session we'll discuss the types of technologies and their uses in a small accounting firm office.