SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Data Breaches and
Your Business
Each year, billions of consumers
around the world are affected by data
breaches.
While there’s really no fail-proof way to
guarantee your business (and thus
your customers) won’t fall victim to a
breach, there are a few things you can
do to help prevent breaches.
If one does occur, how you handle it
will be extremely important.
Here are some tips for how to
prevent a data breach, as well
as guidance on what to do if
one does happen.
Train Your Employees
Your company security starts with who you hire and what you allow
your employees to do.
It’s important to always:
Hire trustworthy people
Have and enforce strict data sharing procedures
Train your employees on your security procedures
Limit access to sensitive data to certain employees
Enforce Strong Password Protection
Compromised passwords are a top cause of data breaches.
Make sure your employees and customers are aware of the
importance of having a strong password in place to access your
system, software or services.
Consider implementing:
A password manager tool for employees
Two-factor authentication for everyone
How noticeable are your legal agreement links?
Monitor All Data Transfers
Train a security administrator or other employee/department to
monitor data transfers both outside and within your business.
Monitor phone calls, emails and other communications for
exchanges that seem suspicious.
Have a Breach Recovery Plan
A data breach can occur even when you take all possible steps to
prevent one.
Have a solid breach recovery plan and train relevant employees
and staff on their respective roles in the plan.
Here are some things you should do as part of your recovery plan if
you experience a data breach:
Confirm the Breach
It may seem obvious, but the first thing you should do if you believe
you’ve had a data breach is confirm that one has actually occurred.
Work with your IT team or relevant staff to pinpoint what’s going on
and if data has actually been compromised.
How noticeable are your legal agreement links?
Isolate the Issue
Figure out exactly how and where the data breach occurred.
Was a specific account’s password compromised? Was your
database accessed via malicious software or some kind of back
door?
When you determine the issue, isolate it. Lock down the
compromised account, bring the affected server offline or take
other specific action.
Where are your legal agreement links placed?
3333Assess Damages
Try to determine exactly what data was compromised, and to what
extent.
Has an entire server been breached, or is it just a handful of
accounts that were affected?
By knowing how deep the damages are you’ll be able to notify all
affected parties and be able to adequately fix the breach.
Take Legal Responsibility
Different laws dictate what you must do in the event of a data breach.
Become familiar with the laws that affect this aspect of your business.
You’ll need to know:
If you’re required to send a Data Breach Notification
What your Data Breach Notification must contain
What timeframe you have for notifying customers
When authorities must be notified
What fines you may accrue if you don’t handle the breach appropriately
By taking appropriate steps to protect
the data at your business, you can help
prevent most data breaches.
If one does occur, it will be very
important how you handle it, both
internally and externally.
Do you use a scroll box to display text of your
legal agreements?

Más contenido relacionado

Más de termsfeed

FTC Disclosures
FTC DisclosuresFTC Disclosures
FTC Disclosurestermsfeed
 
Australia Privacy Act of 1988
Australia Privacy Act of 1988Australia Privacy Act of 1988
Australia Privacy Act of 1988termsfeed
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Acttermsfeed
 
Disclosures for Affiliate Links
Disclosures for Affiliate LinksDisclosures for Affiliate Links
Disclosures for Affiliate Linkstermsfeed
 
Disclaimer Examples
Disclaimer ExamplesDisclaimer Examples
Disclaimer Examplestermsfeed
 
How to Comply with CAN-SPAM
How to Comply with CAN-SPAMHow to Comply with CAN-SPAM
How to Comply with CAN-SPAMtermsfeed
 
Privacy Policy for Flurry
Privacy Policy for FlurryPrivacy Policy for Flurry
Privacy Policy for Flurrytermsfeed
 
Termination Clause in Terms and Conditions
Termination Clause in Terms and ConditionsTermination Clause in Terms and Conditions
Termination Clause in Terms and Conditionstermsfeed
 
Click to Accept: A Method of Clickwrap
Click to Accept: A Method of ClickwrapClick to Accept: A Method of Clickwrap
Click to Accept: A Method of Clickwraptermsfeed
 
Privacy Policy for Wistia
Privacy Policy for WistiaPrivacy Policy for Wistia
Privacy Policy for Wistiatermsfeed
 
The "Your California Privacy Rights" clause
The "Your California Privacy Rights" clauseThe "Your California Privacy Rights" clause
The "Your California Privacy Rights" clausetermsfeed
 
Terms & Conditions Generator
Terms & Conditions GeneratorTerms & Conditions Generator
Terms & Conditions Generatortermsfeed
 
Terms & Conditions FAQ
Terms & Conditions FAQTerms & Conditions FAQ
Terms & Conditions FAQtermsfeed
 
Software License Agreements
Software License AgreementsSoftware License Agreements
Software License Agreementstermsfeed
 
Why use End-User License Agreement (EULA)
Why use End-User License Agreement (EULA)Why use End-User License Agreement (EULA)
Why use End-User License Agreement (EULA)termsfeed
 
Rules for Sweepstakes
Rules for SweepstakesRules for Sweepstakes
Rules for Sweepstakestermsfeed
 
Definition of a Cookies Policy
Definition of a Cookies PolicyDefinition of a Cookies Policy
Definition of a Cookies Policytermsfeed
 
What are Return & Refund Policies
What are Return & Refund PoliciesWhat are Return & Refund Policies
What are Return & Refund Policiestermsfeed
 
Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)termsfeed
 
What's an Opt-Out Policy
What's an Opt-Out PolicyWhat's an Opt-Out Policy
What's an Opt-Out Policytermsfeed
 

Más de termsfeed (20)

FTC Disclosures
FTC DisclosuresFTC Disclosures
FTC Disclosures
 
Australia Privacy Act of 1988
Australia Privacy Act of 1988Australia Privacy Act of 1988
Australia Privacy Act of 1988
 
The Digital Millennium Copyright Act
The Digital Millennium Copyright ActThe Digital Millennium Copyright Act
The Digital Millennium Copyright Act
 
Disclosures for Affiliate Links
Disclosures for Affiliate LinksDisclosures for Affiliate Links
Disclosures for Affiliate Links
 
Disclaimer Examples
Disclaimer ExamplesDisclaimer Examples
Disclaimer Examples
 
How to Comply with CAN-SPAM
How to Comply with CAN-SPAMHow to Comply with CAN-SPAM
How to Comply with CAN-SPAM
 
Privacy Policy for Flurry
Privacy Policy for FlurryPrivacy Policy for Flurry
Privacy Policy for Flurry
 
Termination Clause in Terms and Conditions
Termination Clause in Terms and ConditionsTermination Clause in Terms and Conditions
Termination Clause in Terms and Conditions
 
Click to Accept: A Method of Clickwrap
Click to Accept: A Method of ClickwrapClick to Accept: A Method of Clickwrap
Click to Accept: A Method of Clickwrap
 
Privacy Policy for Wistia
Privacy Policy for WistiaPrivacy Policy for Wistia
Privacy Policy for Wistia
 
The "Your California Privacy Rights" clause
The "Your California Privacy Rights" clauseThe "Your California Privacy Rights" clause
The "Your California Privacy Rights" clause
 
Terms & Conditions Generator
Terms & Conditions GeneratorTerms & Conditions Generator
Terms & Conditions Generator
 
Terms & Conditions FAQ
Terms & Conditions FAQTerms & Conditions FAQ
Terms & Conditions FAQ
 
Software License Agreements
Software License AgreementsSoftware License Agreements
Software License Agreements
 
Why use End-User License Agreement (EULA)
Why use End-User License Agreement (EULA)Why use End-User License Agreement (EULA)
Why use End-User License Agreement (EULA)
 
Rules for Sweepstakes
Rules for SweepstakesRules for Sweepstakes
Rules for Sweepstakes
 
Definition of a Cookies Policy
Definition of a Cookies PolicyDefinition of a Cookies Policy
Definition of a Cookies Policy
 
What are Return & Refund Policies
What are Return & Refund PoliciesWhat are Return & Refund Policies
What are Return & Refund Policies
 
Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)
 
What's an Opt-Out Policy
What's an Opt-Out PolicyWhat's an Opt-Out Policy
What's an Opt-Out Policy
 

Último

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理ss
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 

Último (20)

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 

Data Breaches and Your Business

  • 2. Each year, billions of consumers around the world are affected by data breaches. While there’s really no fail-proof way to guarantee your business (and thus your customers) won’t fall victim to a breach, there are a few things you can do to help prevent breaches. If one does occur, how you handle it will be extremely important.
  • 3. Here are some tips for how to prevent a data breach, as well as guidance on what to do if one does happen.
  • 4. Train Your Employees Your company security starts with who you hire and what you allow your employees to do. It’s important to always: Hire trustworthy people Have and enforce strict data sharing procedures Train your employees on your security procedures Limit access to sensitive data to certain employees
  • 5. Enforce Strong Password Protection Compromised passwords are a top cause of data breaches. Make sure your employees and customers are aware of the importance of having a strong password in place to access your system, software or services. Consider implementing: A password manager tool for employees Two-factor authentication for everyone
  • 6. How noticeable are your legal agreement links? Monitor All Data Transfers Train a security administrator or other employee/department to monitor data transfers both outside and within your business. Monitor phone calls, emails and other communications for exchanges that seem suspicious.
  • 7. Have a Breach Recovery Plan A data breach can occur even when you take all possible steps to prevent one. Have a solid breach recovery plan and train relevant employees and staff on their respective roles in the plan. Here are some things you should do as part of your recovery plan if you experience a data breach:
  • 8. Confirm the Breach It may seem obvious, but the first thing you should do if you believe you’ve had a data breach is confirm that one has actually occurred. Work with your IT team or relevant staff to pinpoint what’s going on and if data has actually been compromised.
  • 9. How noticeable are your legal agreement links? Isolate the Issue Figure out exactly how and where the data breach occurred. Was a specific account’s password compromised? Was your database accessed via malicious software or some kind of back door? When you determine the issue, isolate it. Lock down the compromised account, bring the affected server offline or take other specific action.
  • 10. Where are your legal agreement links placed? 3333Assess Damages Try to determine exactly what data was compromised, and to what extent. Has an entire server been breached, or is it just a handful of accounts that were affected? By knowing how deep the damages are you’ll be able to notify all affected parties and be able to adequately fix the breach.
  • 11. Take Legal Responsibility Different laws dictate what you must do in the event of a data breach. Become familiar with the laws that affect this aspect of your business. You’ll need to know: If you’re required to send a Data Breach Notification What your Data Breach Notification must contain What timeframe you have for notifying customers When authorities must be notified What fines you may accrue if you don’t handle the breach appropriately
  • 12. By taking appropriate steps to protect the data at your business, you can help prevent most data breaches. If one does occur, it will be very important how you handle it, both internally and externally.
  • 13. Do you use a scroll box to display text of your legal agreements?