Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
SavvyBizBuilder
Small Business Owners – Don’t Get Caught With Out Data                      Security.Facebook.com/SavvyBizBuilder   www.Sa...
15 Proactive ways to secure customer data1.     Review and follow the laws governing data security· Federal Trade Commissi...
2. Know what you have and who has access to itCheck files and computers for what information you have; and where it’s stor...
5. Protect your computer by installing a firewallFirewalls help keep hackers from using your computer to send outpersonal ...
8. Guard your laptopThere are a number of vendors that offer stealthy software solutions that enableyour laptop to check i...
11. Use Qualys free tool to check your systemsQualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities,...
14. Use a Secure Sockets Layer (SSL)A SSL certificate ensures that you are communicating with the intendedparty and not an...
Thank you   forwatching!
For more Savvy Online Business Building Tips                                     Visit                    www.SavvyBizBuil...
Upcoming SlideShare
Loading in …5
×

Small Business Owners – Don’t Get Caught With Out Data Security.

358 views

Published on

Today’s customers are concerned about the security of their data because of phishing emails and the rise of identity theft. These online threats are affecting small-business owners too. Companies must maintain reasonable procedures to protect sensitive information.

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

Small Business Owners – Don’t Get Caught With Out Data Security.

  1. 1. SavvyBizBuilder
  2. 2. Small Business Owners – Don’t Get Caught With Out Data Security.Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  3. 3. 15 Proactive ways to secure customer data1. Review and follow the laws governing data security· Federal Trade Commission Act (FTC Act)· Fair Credit Reporting Act (FCRA)· Gramm-Leach-Bliley Act (GLBA)· FTC Disposal Rule· Other federal laws (HIPAA, DPPA, FERPA)· State laws Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  4. 4. 2. Know what you have and who has access to itCheck files and computers for what information you have; and where it’s stored.Don’t forget portable devices and offsite locations.3. Keep only what you need for to streamline storageCollect only what you need and keep it only for the time you need it. Scale downwhat you store on devices connected to the Internet.4. Partner with OnGuard OnlineThe federal government and the technology industry have teamed up to preparematerials that can help guard against Internet fraud, secure computers, andprotect personal information. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  5. 5. 5. Protect your computer by installing a firewallFirewalls help keep hackers from using your computer to send outpersonal information without your permission.6. Properly dispose of what you no longer needMake sure papers containing personal information are shredded. Be sureto use commercial shredding companies for large volumes of paper.7. Properly erase data you no longer needUse disk wipe software to clean, delete and erase data, files or programs oncomputers and portable storage devices. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  6. 6. 8. Guard your laptopThere are a number of vendors that offer stealthy software solutions that enableyour laptop to check in to a tracking center periodically using a traceable signal.9. Protect, audit and certify the security of your websiteThe ScanAlert product sweeps your website for potential security flaws,and then posts a “Hacker Safe” security logo if the site comes up clean.10. Verify information handling practicesIf you give another organization access to your records or computer network,you should make sure they have good security programs too. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  7. 7. 11. Use Qualys free tool to check your systemsQualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities,provides a detailed report with information for each vulnerability and links toverified fixes.12. Automate the process of updating security softwareUse automation to make sure systems maintain their secure configuration,remain fully patched with the latest version of the software (including keepinganti-virus software up to date).13. Attend security awareness trainingSecurity awareness training is designed to educate business owners on theappropriate use, responsibilities and ongoing protection of customer data. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  8. 8. 14. Use a Secure Sockets Layer (SSL)A SSL certificate ensures that you are communicating with the intendedparty and not an imposter by authentication and encryption.15. Use off site storageYour critical information goes to a secure central data storage facility thatmanages, and protects you customer information, business data, and records. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  9. 9. Thank you forwatching!
  10. 10. For more Savvy Online Business Building Tips Visit www.SavvyBizBuilder.comFacebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder

×