Security Protocols: Take Steps to Prevent Disclosure of Company Info

?The recent discovery of sensitive, classified documents on the property of President Joe Biden, former President Donald Trump and former Vice President Mike Pence—material that is supposed to reside in the legal custody of the National Archives when there is a transition between administrations—underscores the importance of security protocols and carefully handling classified and proprietary information.

“Former security officials and analysts say it’s actually not uncommon for such documents to show up in the personal files of former presidents and vice presidents,” USA Today reported, “especially given the explosion of confidential, secret and top-secret information these days that is kept in both electronic and paper form.”

Sensitive information—whether in printed or digital form—needs to be safeguarded and protecting it is an issue for workplaces as well as governments. The average cost of a data breach in the U.S. in 2022 was $9.4 million, according to a 2022 IBM report.

SHRM Online collected the following news stories and resources on this topic.

Lack of Employee Training Is Behind 80% of Company Data Breaches

More than 80 percent of all company data breaches are caused by people, according to a recent report by cybersecurity resource platform SANS. The most popular kind include phishing and business e-mail compromise scams—when people are manipulated by an attacker to divulge delicate information—and ransomware.

Not enough companies are thinking about cybersecurity as a two-fold problem, according to Lance Spitzner, senior instructor at SANS. Companies play a role, too. There is so much emphasis on the technology, hardware and practices necessary to keep devices safe, that companies often forget that attackers aren’t targeting tech—they’re targeting people. Without proper security awareness training, it’s easier for their attacks to succeed.
(Employee Benefit News

Cost of a Data Breach 2022

The best way to prevent a data breach is to understand why it’s happening. Now in its 17th year, the 2022 Cost of a Data Breach report shares the latest insights into the expanding threat landscape and offers recommendations for how to save time and limit losses. The study on which the report is based was conducted in 17 countries or regional samples.
(IBM

Breaches of Confidentiality Aren’t Limited to High Court

When the Supreme Court’s draft document overturning Roe v. Wade was leaked to the press, many senior HR executives took notice. The leak brought to mind the theft of proprietary information within their own organizations. How can employees be deterred from walking off with company trade secrets and other information targeted by competitors?
(SHRM Online

Proprietary Information: What Hiring Managers Need to Know

Protecting your company’s data and intellectual property is important as it keeps your information from being stolen from outside parties and helps you maintain your competitive edge in the market. By implementing company policies and strategies that properly secure your proprietary information, you can prevent employees from leaking critical company data and ideas to competitors.
(Indeed.com

Protecting Personal Information: A Guide for Business

Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees and often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. A sound data security plan is built on five key principles.
(Federal Trade Commission

Quiz: What Do You Know About Data-Breach Laws?

Data breaches don’t happen only at big companies; they can occur at small businesses, too. That’s why companies of all sizes must ensure that they are protecting consumer and employee information and complying with all applicable laws. Take this quiz to test your knowledge about Data-Breach Laws.
(SHRM Online)

Leave a Reply

Your email address will not be published. Required fields are marked *