SlideShare a Scribd company logo
TOP 10
TIPSFOR DATA SECURITY
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
How and where does sensitive information
come in and out of your Company? Where is
the sensitive data located? Who can access
these locations? Once you have documented
the answers to these questions, you can begin
the process of putting the proper technical and
administrative safeguards in place.
1IDENTIFY AND
DOCUMENT YOUR
SENSITIVE DATA
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
2BE AWARE OF
REGULATIONS
THAT APPLY TO
YOUR DATA
Regulations, both state and federal, are
increasing every year. Your industry may also
have published recommended standards for
data security. Understanding how and where
you do business and the regulations that may
apply, should be a key component in every
company’s annual risk assessment. Not
knowing which regulations apply to your
Company can be a significant risk in and of
itself, especially when it comes to the
potential financial and reputational impacts
of non-compliance if a breach occurs.
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Avoid using public Wi‐Fi hot spots if at all
possible, as they are typically easy to hack
which can potentially expose all of your
Internet traffic to a cyber-criminal.
3
BE SMART WHEN USING
FREE WI-FI
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Use a password on your mobile device because
if it is stolen, the process of trying to break the
password may allow you time to locate the
device or remotely wipe it before your data is
accessed. Also, since phones and tablets are
not immune to malware, install an antivirus
application on your device.
4
SECURE YOUR
MOBILE DEVICE
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Encryption is one of the best defenses against
cyber crime, to the point where several
jurisdictions consider encrypted data a “safe
harbor” so that the loss of your device won’t be
considered a data breach requiring notification.
Be sure to encrypt your laptops as well as any
mobile or portable devices (e.g. external hard
drives, tablets, etc.) that contain sensitive data.
5ENCRYPT
YOUR DATA
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Be wary of suspicious e-mail – there is a chance
that the email may be a spear phishing attack,
and you are being deceived into voluntarily
compromising information. Be cautious when
you receive an unexpected email asking you to
open an attachment, provide sensitive
information, or visit a website.
6BEWARE OF
SPEAR PHISHING
ATTACKS
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
The best policies and safeguards in the world
won’t really matter if end users don’t
understand the importance of security, so turn
your users into your Company’s most
important defense against attacks by making
sure they receive the necessary training.
7EDUCATE YOUR USERS
ON THE IMPORTANCE
OF DATA SECURITY
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Choose long and complex passwords for your
computer and change them periodically
throughout the year. Don’t use the same
password on all of your financial websites,
because if your password on one site were to
become compromised, all of your sites could
then be accessed.
8UTILIZE GOOD
PASSWORD
STRATEGIES
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Have a comprehensive disaster recovery plan in
place and be sure to test it at least once a year.
And since the costs of cybercrime and data
breaches can be extremely expensive, be sure
your Company evaluates the benefits of having
cyber insurance.
9BE PREPARED IT IS NOT
A MATTER OF IF…IT IS A
MATTER OF WHEN
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
You may think you’re backing your data up, but
have you tested to see if the backup can be
restored? Taking the time to do a periodic
viability test on your backups can help you
avoid being unable to restore your data in the
event of a real disaster.
10TEST YOUR BACKUPS
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
Michael Camacho, CPA, CIA: mcamacho@lgcd.com
Kevin Ricci, CISA, CRISC, MCSE: kricci@lgcd.com
LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
We hope you enjoyed today’s discussion and leave with a better
understanding of the risks associated with data privacy and
security and some strategies to protect your Company.
Today’s discussion only scratched the surface on the risks that
can impact your Company. A common misconception is that
using a third party IT administrator or having an accountant
reviewing or auditing your Company on an annual basis means
your Company is secure. This is not the case - neither of these
services are designed to evaluate your system security.
Should you like to have a more in depth discussion on how
certain risks or regulations impact your Company, or would like
to discuss a formal systems assessment, please contact Michael
Camacho or Kevin Ricci by email or by phone at 401.421.4800
for more information.

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
National LECET
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
Eric Kavanagh
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
Texas Medical Liability Trust
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
Mobeen Khan
 
Cybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence BriefingCybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence Briefing
www.securekm.com; Secure Knowledge Management Inc.
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealthInvest
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
Skyport Systems
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
PwC France
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
Stephen Cobb
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your Business
Sikich LLP
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
North Texas Chapter of the ISSA
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
Russell_Kennedy
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
PECB
 

What's hot (20)

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Cybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence BriefingCybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence Briefing
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
Beyond The Dark Hacking Screen
Beyond The Dark Hacking ScreenBeyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
 
netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...netwealth and Sense Of Security webinar: What you need to know about cyber se...
netwealth and Sense Of Security webinar: What you need to know about cyber se...
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your Business
 
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 

Similar to Top 10 Tips for Data Security

The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
CIPL Corporate Infotech
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
BVU
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
Julius Clark, CISSP, CISA
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
Danielle Bowers
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
Iron Mountain
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
NovaQuantum
 
ITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptxITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptx
hoshangvashisht1
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
Raffa Learning Community
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
Puneet Kukreja
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 

Similar to Top 10 Tips for Data Security (20)

The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365Novaquantum advanced security for Microsoft 365
Novaquantum advanced security for Microsoft 365
 
ITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptxITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptx
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 

More from lgcdcpas

Risk contracting
Risk contractingRisk contracting
Risk contracting
lgcdcpas
 
Nursing home industry presentation
Nursing home industry presentationNursing home industry presentation
Nursing home industry presentation
lgcdcpas
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
Inside The Audit
Inside The AuditInside The Audit
Inside The Audit
lgcdcpas
 
Basics of construction accouting
Basics of construction accoutingBasics of construction accouting
Basics of construction accouting
lgcdcpas
 
Results Reimagined
Results ReimaginedResults Reimagined
Results Reimagined
lgcdcpas
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 

More from lgcdcpas (7)

Risk contracting
Risk contractingRisk contracting
Risk contracting
 
Nursing home industry presentation
Nursing home industry presentationNursing home industry presentation
Nursing home industry presentation
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Inside The Audit
Inside The AuditInside The Audit
Inside The Audit
 
Basics of construction accouting
Basics of construction accoutingBasics of construction accouting
Basics of construction accouting
 
Results Reimagined
Results ReimaginedResults Reimagined
Results Reimagined
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Top 10 Tips for Data Security

  • 1. TOP 10 TIPSFOR DATA SECURITY LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 2. How and where does sensitive information come in and out of your Company? Where is the sensitive data located? Who can access these locations? Once you have documented the answers to these questions, you can begin the process of putting the proper technical and administrative safeguards in place. 1IDENTIFY AND DOCUMENT YOUR SENSITIVE DATA LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 3. 2BE AWARE OF REGULATIONS THAT APPLY TO YOUR DATA Regulations, both state and federal, are increasing every year. Your industry may also have published recommended standards for data security. Understanding how and where you do business and the regulations that may apply, should be a key component in every company’s annual risk assessment. Not knowing which regulations apply to your Company can be a significant risk in and of itself, especially when it comes to the potential financial and reputational impacts of non-compliance if a breach occurs. LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 4. Avoid using public Wi‐Fi hot spots if at all possible, as they are typically easy to hack which can potentially expose all of your Internet traffic to a cyber-criminal. 3 BE SMART WHEN USING FREE WI-FI LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 5. Use a password on your mobile device because if it is stolen, the process of trying to break the password may allow you time to locate the device or remotely wipe it before your data is accessed. Also, since phones and tablets are not immune to malware, install an antivirus application on your device. 4 SECURE YOUR MOBILE DEVICE LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 6. Encryption is one of the best defenses against cyber crime, to the point where several jurisdictions consider encrypted data a “safe harbor” so that the loss of your device won’t be considered a data breach requiring notification. Be sure to encrypt your laptops as well as any mobile or portable devices (e.g. external hard drives, tablets, etc.) that contain sensitive data. 5ENCRYPT YOUR DATA LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 7. Be wary of suspicious e-mail – there is a chance that the email may be a spear phishing attack, and you are being deceived into voluntarily compromising information. Be cautious when you receive an unexpected email asking you to open an attachment, provide sensitive information, or visit a website. 6BEWARE OF SPEAR PHISHING ATTACKS LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 8. The best policies and safeguards in the world won’t really matter if end users don’t understand the importance of security, so turn your users into your Company’s most important defense against attacks by making sure they receive the necessary training. 7EDUCATE YOUR USERS ON THE IMPORTANCE OF DATA SECURITY LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 9. Choose long and complex passwords for your computer and change them periodically throughout the year. Don’t use the same password on all of your financial websites, because if your password on one site were to become compromised, all of your sites could then be accessed. 8UTILIZE GOOD PASSWORD STRATEGIES LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 10. Have a comprehensive disaster recovery plan in place and be sure to test it at least once a year. And since the costs of cybercrime and data breaches can be extremely expensive, be sure your Company evaluates the benefits of having cyber insurance. 9BE PREPARED IT IS NOT A MATTER OF IF…IT IS A MATTER OF WHEN LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 11. You may think you’re backing your data up, but have you tested to see if the backup can be restored? Taking the time to do a periodic viability test on your backups can help you avoid being unable to restore your data in the event of a real disaster. 10TEST YOUR BACKUPS LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com
  • 12. Michael Camacho, CPA, CIA: mcamacho@lgcd.com Kevin Ricci, CISA, CRISC, MCSE: kricci@lgcd.com LGCD IT Solutions | 10 Weybosset Street, Suite 700, Providence, RI 02903 | 401-421-4800 | 401-421-0643 fax | www.lgcd.com We hope you enjoyed today’s discussion and leave with a better understanding of the risks associated with data privacy and security and some strategies to protect your Company. Today’s discussion only scratched the surface on the risks that can impact your Company. A common misconception is that using a third party IT administrator or having an accountant reviewing or auditing your Company on an annual basis means your Company is secure. This is not the case - neither of these services are designed to evaluate your system security. Should you like to have a more in depth discussion on how certain risks or regulations impact your Company, or would like to discuss a formal systems assessment, please contact Michael Camacho or Kevin Ricci by email or by phone at 401.421.4800 for more information.