SlideShare ist ein Scribd-Unternehmen logo
1 von 10
SavvyBizBuilder
Small Business Owners – Don’t Get Caught With Out Data
                      Security.




Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
15 Proactive ways to secure customer data

1.     Review and follow the laws governing data security

· Federal Trade Commission Act (FTC Act)
· Fair Credit Reporting Act (FCRA)
· Gramm-Leach-Bliley Act (GLBA)
· FTC Disposal Rule
· Other federal laws (HIPAA, DPPA, FERPA)
· State laws




     Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
2. Know what you have and who has access to it

Check files and computers for what information you have; and where it’s stored.
Don’t forget portable devices and offsite locations.

3. Keep only what you need for to streamline storage

Collect only what you need and keep it only for the time you need it. Scale down
what you store on devices connected to the Internet.

4. Partner with OnGuard Online

The federal government and the technology industry have teamed up to prepare
materials that can help guard against Internet fraud, secure computers, and
protect personal information.


  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com     Twitter.com/SavvyBizBuilder
5. Protect your computer by installing a firewall

Firewalls help keep hackers from using your computer to send out
personal information without your permission.

6. Properly dispose of what you no longer need

Make sure papers containing personal information are shredded. Be sure
to use commercial shredding companies for large volumes of paper.

7. Properly erase data you no longer need

Use disk wipe software to clean, delete and erase data, files or programs on
computers and portable storage devices.



  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
8. Guard your laptop

There are a number of vendors that offer stealthy software solutions that enable
your laptop to check in to a tracking center periodically using a traceable signal.

9. Protect, audit and certify the security of your website

The ScanAlert product sweeps your website for potential security flaws,
and then posts a “Hacker Safe” security logo if the site comes up clean.

10. Verify information handling practices

If you give another organization access to your records or computer network,
you should make sure they have good security programs too.


  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com        Twitter.com/SavvyBizBuilder
11. Use Qualys free tool to check your systems

Qualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities,
provides a detailed report with information for each vulnerability and links to
verified fixes.

12. Automate the process of updating security software

Use automation to make sure systems maintain their secure configuration,
remain fully patched with the latest version of the software (including keeping
anti-virus software up to date).

13. Attend security awareness training

Security awareness training is designed to educate business owners on the
appropriate use, responsibilities and ongoing protection of customer data.
  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com       Twitter.com/SavvyBizBuilder
14. Use a Secure Sockets Layer (SSL)

A SSL certificate ensures that you are communicating with the intended
party and not an imposter by authentication and encryption.

15. Use off site storage

Your critical information goes to a secure central data storage facility that
manages, and protects you customer information, business data, and records.




  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com    Twitter.com/SavvyBizBuilder
Thank you
   for
watching!
For more Savvy Online Business Building Tips

                                     Visit

                    www.SavvyBizBuilder.com




Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder

Weitere ähnliche Inhalte

Was ist angesagt?

IBM at RSA 2009 conference
IBM at RSA 2009 conferenceIBM at RSA 2009 conference
IBM at RSA 2009 conferenceTiffany Winman
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsWatchful Software
 
Wordpress Security
Wordpress SecurityWordpress Security
Wordpress SecurityPeter Bui
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSWatchful Software
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressChelsea O'Brien
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security PresentationIdeba
 
What is network security.docx
What is network security.docxWhat is network security.docx
What is network security.docxkarelruth
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityMarilyn N
 

Was ist angesagt? (10)

IBM at RSA 2009 conference
IBM at RSA 2009 conferenceIBM at RSA 2009 conference
IBM at RSA 2009 conference
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
Wordpress Security
Wordpress SecurityWordpress Security
Wordpress Security
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
What is network security.docx
What is network security.docxWhat is network security.docx
What is network security.docx
 
WordPress Security 2018
WordPress Security 2018WordPress Security 2018
WordPress Security 2018
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 

Andere mochten auch

Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKate Bladow
 
Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!vogus
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Educationbkoch
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 

Andere mochten auch (6)

Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Idesco 2013
Idesco 2013Idesco 2013
Idesco 2013
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Education
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 

Ähnlich wie Small Business Owners – Don’t Get Caught With Out Data Security.

FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023BeePlugin
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016Marketing Team
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafePixlogix Infotech
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
Cybersecurity Measures Every Small Business Must Take
Cybersecurity Measures  Every Small Business Must TakeCybersecurity Measures  Every Small Business Must Take
Cybersecurity Measures Every Small Business Must TakeThe Tech Consultants
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 

Ähnlich wie Small Business Owners – Don’t Get Caught With Out Data Security. (20)

FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023
 
Secure End User
Secure End UserSecure End User
Secure End User
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Cybersecurity Measures Every Small Business Must Take
Cybersecurity Measures  Every Small Business Must TakeCybersecurity Measures  Every Small Business Must Take
Cybersecurity Measures Every Small Business Must Take
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 

Kürzlich hochgeladen

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 

Kürzlich hochgeladen (20)

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 

Small Business Owners – Don’t Get Caught With Out Data Security.

  • 2. Small Business Owners – Don’t Get Caught With Out Data Security. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 3. 15 Proactive ways to secure customer data 1. Review and follow the laws governing data security · Federal Trade Commission Act (FTC Act) · Fair Credit Reporting Act (FCRA) · Gramm-Leach-Bliley Act (GLBA) · FTC Disposal Rule · Other federal laws (HIPAA, DPPA, FERPA) · State laws Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 4. 2. Know what you have and who has access to it Check files and computers for what information you have; and where it’s stored. Don’t forget portable devices and offsite locations. 3. Keep only what you need for to streamline storage Collect only what you need and keep it only for the time you need it. Scale down what you store on devices connected to the Internet. 4. Partner with OnGuard Online The federal government and the technology industry have teamed up to prepare materials that can help guard against Internet fraud, secure computers, and protect personal information. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 5. 5. Protect your computer by installing a firewall Firewalls help keep hackers from using your computer to send out personal information without your permission. 6. Properly dispose of what you no longer need Make sure papers containing personal information are shredded. Be sure to use commercial shredding companies for large volumes of paper. 7. Properly erase data you no longer need Use disk wipe software to clean, delete and erase data, files or programs on computers and portable storage devices. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 6. 8. Guard your laptop There are a number of vendors that offer stealthy software solutions that enable your laptop to check in to a tracking center periodically using a traceable signal. 9. Protect, audit and certify the security of your website The ScanAlert product sweeps your website for potential security flaws, and then posts a “Hacker Safe” security logo if the site comes up clean. 10. Verify information handling practices If you give another organization access to your records or computer network, you should make sure they have good security programs too. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 7. 11. Use Qualys free tool to check your systems Qualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities, provides a detailed report with information for each vulnerability and links to verified fixes. 12. Automate the process of updating security software Use automation to make sure systems maintain their secure configuration, remain fully patched with the latest version of the software (including keeping anti-virus software up to date). 13. Attend security awareness training Security awareness training is designed to educate business owners on the appropriate use, responsibilities and ongoing protection of customer data. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 8. 14. Use a Secure Sockets Layer (SSL) A SSL certificate ensures that you are communicating with the intended party and not an imposter by authentication and encryption. 15. Use off site storage Your critical information goes to a secure central data storage facility that manages, and protects you customer information, business data, and records. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 9. Thank you for watching!
  • 10. For more Savvy Online Business Building Tips Visit www.SavvyBizBuilder.com Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder