Creating a Data Loss Incident Plan - Slide 6

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20
Next Data Loss Prevention Framework-6 Next

Data Loss Prevention Framework

The increased complexity of internal systems and use of outsourced, temporary employees, contractors and remote worker increases the risk. There is a wide array of technologies and third party solutions to help identify accidental, unauthorized and or illegal movement or transfers of data and documents. The following security best practices are recommended for every organization:

  • Use of Secure Socket Layer (SSL) for all data collection forms
  • Extended Validation SSL Certificates for all commerce and banking applications
  • Data & disk encryption
  • Multi-layered firewall protection
  • Encryption of wireless routers
  • Default disabling of shared folders
  • Dual factor authentication to limit or control access
  • Security risks of password reset and identity verification security questions
  • Upgrading to browsers with integrated anti-phishing and anti-malware
  • E-mail authentication to help detect malicious and deceptive e-mail and websites
  • Upgrading to current browsers
  • Enabling privacy and data collection controls
  • Automatic patch management for operating systems, applications & add-ons
  • Inventory system access credentials
  • Remote wiping of smart phones
  • Use of DNSSEC (Domain Name System Security Extensions)

The Online Trust Alliance (OTA) advocates that all businesses create an incident response plan and be prepared for the likelihood that they will experience a breach or data loss in the future. The fact is breaches happen and often at the worst of times. Rather than be lulled into the belief it will not happen to your business, a well-designed plan is emerging as an essential part of regulatory compliance, demonstrating that a firm or organization is willing to take reasonable steps to protect data from abuse. Doing so is good business. Developing a plan can help to minimize risk to consumers, business partners and stockholders, while increasing brand protection and the long-term viability of a business.

This slideshow highlights key questions and recommendations for businesses to consider while building a data loss incident plan.

More Slideshows:

10 Tips for Making Websites Stickier Develop an effective strategy to keep customers engaged.

The Mobile Work Force Today Mobile employees carry an average of 2.68 mobile devices, including laptops, smartphones and increasingly tablets.

10 New Smartphones for Business New smartphones for today's business user.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.