Contact Us (905) 847-2583

Data Theft and Data Security – A Summary of 6 Must Read Articles

In this article, we gather the best tips found online to help your company guard against data theft and security issues. These tips include utilizing a cyber security policy, leveraging encryption to protect data in transit, investing in education alongside industry partnerships, utilizing software patching systems, and disposing of digital data.

Blue-Pencil helps clients across Ontario safeguard information and protect their reputation with stakeholders.  Click here for a free information security audit.

Best Tips on Data Security and Guarding Against Data Theft

Here is a select list of data security tips offered by authors from sources around the web that are sure to have takeaways for business owners or residents. Though each of these writers offer a number of great tips in each article, the point with the greatest impact has been highlighted along with why they made the list.

Business news daily article screenshot

Business News Daily

Article Title: Cyber Security: A Small Business Guide
Our Takeaway: Consider cyber insurance
Featured Tip: Cyber insurance is a great way to ensure that business losses resulting from security breaches can be covered and recuperated. As noted by Business News, small businesses often neglect this option, assuming only large enterprises are covered. Having a final contingency will help business owners feel secure as there are always vulnerabilities (although these are reduced by rigorous security practices).
Why it makes the list: The featured post also offers a wealth of other best practices and pitfalls that companies run into when securing their electronic office coupled with illustrations and first-hand experiences.  This written piece offers a sobering and stimulating look into data theft and security.
Source: http://www.businessnewsdaily.com/8231-small-business-cybersecurity-guide.html

Inc article screenshot

Inc.

Article Title How to Prevent Identity Theft in Your Business
Our Takeaway: Leverage encryption technologies for rendering data unintelligible
Featured Tip: Using encryption technologies like Secure Socket Layer (SSL) and Transport Layer Security can help you secure data moving through networks. This approach provides a way to safeguard data that is in transit from being picked up and interpreted by malicious viewers.
Why it makes the list: Inc. offers general tips and goes further to recommends steps in guarding against identity theft for businesses. We’ve included it here for its focus on end-to-end, recommendation to implementation, approach.
Source: http://www.inc.com/guides/2010/04/preventing-identity-theft-in-your-business.html

Wired article on data theft, data security

Wired

Article Title: The Root of the Problem: How to Prevent Security Breaches:
Our Takeaway: Invest in education and industry partnerships
Featured Tip: Wired hits the target as it identifies that a key gap in data security is education for current staff and upcoming graduates. If staff were properly trained and educated from the get-go, there would be far fewer security vulnerabilities.
Why it makes the list: The tip from Wired not only offers what a company can do, but also helps build greater industry collaboration by partnering with academic institutions on data security needs, while also investing in internships to groom staff on security practices.
Source: http://www.wired.com/insights/2015/02/the-root-of-the-security-problem/

Logo

Residential and Commercial clients continue to make Blue-Pencil their go-to provider to help them protect against data theft. Here is what a recent customer has to say about Blue-Pencil.

Always efficient and the process is always so easy! They come by on schedule and when we have extra shredding that needs to be done it’s never an issue! Highly recommended. The gentlemen Adam and Lenny are also super polite, friendly and professional!

– Vanessa

Click here for more reviews.

xtraspace page sample

CIO (Chief Information Officer).com

Article Title: 6 Biggest Business Security Risk and How you Can Fight Back
Our Takeaway: Use a patch management program
Featured Tip: The applications used by a company on desktops or servers may have outdated software, leading to security vulnerabilities. CIO suggests utilizing patch management software to track all organization application software versions to ensure high priority applications handling sensitive data can be routinely secured with the latest software update.
Why it makes the list: CIO pens a great article, providing depth and recommended next steps to help organization bolster their data security profile.
Source: http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html?page=2

NoIdentityTheft.com

data-theft-summary-article-tips-12

Article Title: Dealing with Identity Theft Definitive Guide
Our Takeaway: Don’t use a one size fits all strategy when dealing with an identity theft, there are specific rules and contacts required to ensure the safety of your family and business.
Featured Tip: Getting a credit  freeze or monitoring is a helpful way to manage and curtail identity theft perpetrators. The guide also provides limitations of existing measures and how credit alerts don’t protect individuals or companies on  criminal record theft and medical identity theft.
Why it makes the list: Probably the best looking resource out there on identity theft while also being comprehensive.
Source: http://www.noidentitytheft.com/identity-theft-guide/

Heimdal blog article screenshot on data security

Heimdal Security

Article Title: How to Prevent Identity Theft in 20 Essential Steps
Our Takeaway: Destroy your digital data
Featured Tip: Destroying digital data ensures that companies and individuals are safeguarding their information from being leaked out to malicious individuals. In short, a data leak cannot occur if the data is simply not there to be exposed.
Why it makes the list: Heimdal offers a number of tips and steps to securing personal information, coupled with great questions and actionable steps for helping companies and individuals develop data security habits.
Source: https://heimdalsecurity.com/blog/how-to-prevent-identity-theft-20-steps/

Blue-Pencil Helps You Prevent Data Theft through Secure and Certified Disposal Services

NAID-small-logo

As we’ve seen, one of the safest approaches to guarding against security issues and data theft is precise and secure disposal of information. Get started today with a free Information Destruction Policy template. Blue-Pencil offers guaranteed disposal of information via quality and friendly services, including:

Blue-Pencil is an information security company that has been serving the needs of clients in Canada since 2004. We have grown our document security business over the past 10 years, serving more than 6,000 organizations including small and medium-sized companies as well as Fortune 500 businesses. We have recently launched two new divisions: Documents Storage and Records Management division and Document Imaging and Scanning Solutions division. This allows us to offer full spectrum, comprehensive solutions for information security management. We service the GTA and surrounding cities –  click here for a full list of our service areas. If you’d like to learn more about us and what we can do for you, contact us today!