SlideShare une entreprise Scribd logo
1  sur  10
SavvyBizBuilder
Small Business Owners – Don’t Get Caught With Out Data
                      Security.




Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
15 Proactive ways to secure customer data

1.     Review and follow the laws governing data security

· Federal Trade Commission Act (FTC Act)
· Fair Credit Reporting Act (FCRA)
· Gramm-Leach-Bliley Act (GLBA)
· FTC Disposal Rule
· Other federal laws (HIPAA, DPPA, FERPA)
· State laws




     Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
2. Know what you have and who has access to it

Check files and computers for what information you have; and where it’s stored.
Don’t forget portable devices and offsite locations.

3. Keep only what you need for to streamline storage

Collect only what you need and keep it only for the time you need it. Scale down
what you store on devices connected to the Internet.

4. Partner with OnGuard Online

The federal government and the technology industry have teamed up to prepare
materials that can help guard against Internet fraud, secure computers, and
protect personal information.


  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com     Twitter.com/SavvyBizBuilder
5. Protect your computer by installing a firewall

Firewalls help keep hackers from using your computer to send out
personal information without your permission.

6. Properly dispose of what you no longer need

Make sure papers containing personal information are shredded. Be sure
to use commercial shredding companies for large volumes of paper.

7. Properly erase data you no longer need

Use disk wipe software to clean, delete and erase data, files or programs on
computers and portable storage devices.



  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder
8. Guard your laptop

There are a number of vendors that offer stealthy software solutions that enable
your laptop to check in to a tracking center periodically using a traceable signal.

9. Protect, audit and certify the security of your website

The ScanAlert product sweeps your website for potential security flaws,
and then posts a “Hacker Safe” security logo if the site comes up clean.

10. Verify information handling practices

If you give another organization access to your records or computer network,
you should make sure they have good security programs too.


  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com        Twitter.com/SavvyBizBuilder
11. Use Qualys free tool to check your systems

Qualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities,
provides a detailed report with information for each vulnerability and links to
verified fixes.

12. Automate the process of updating security software

Use automation to make sure systems maintain their secure configuration,
remain fully patched with the latest version of the software (including keeping
anti-virus software up to date).

13. Attend security awareness training

Security awareness training is designed to educate business owners on the
appropriate use, responsibilities and ongoing protection of customer data.
  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com       Twitter.com/SavvyBizBuilder
14. Use a Secure Sockets Layer (SSL)

A SSL certificate ensures that you are communicating with the intended
party and not an imposter by authentication and encryption.

15. Use off site storage

Your critical information goes to a secure central data storage facility that
manages, and protects you customer information, business data, and records.




  Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com    Twitter.com/SavvyBizBuilder
Thank you
   for
watching!
For more Savvy Online Business Building Tips

                                     Visit

                    www.SavvyBizBuilder.com




Facebook.com/SavvyBizBuilder   www.SavvyBizBuilder.com   Twitter.com/SavvyBizBuilder

Contenu connexe

Tendances

Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
Watchful Software
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
Chelsea O'Brien
 

Tendances (10)

IBM at RSA 2009 conference
IBM at RSA 2009 conferenceIBM at RSA 2009 conference
IBM at RSA 2009 conference
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
Wordpress Security
Wordpress SecurityWordpress Security
Wordpress Security
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
Windstream Managed Network Security Presentation
Windstream Managed Network Security PresentationWindstream Managed Network Security Presentation
Windstream Managed Network Security Presentation
 
What is network security.docx
What is network security.docxWhat is network security.docx
What is network security.docx
 
WordPress Security 2018
WordPress Security 2018WordPress Security 2018
WordPress Security 2018
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 

En vedette (6)

Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Idesco 2013
Idesco 2013Idesco 2013
Idesco 2013
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!Recalls, Recovery, and (Credit) Reports, Oh My!
Recalls, Recovery, and (Credit) Reports, Oh My!
 
Online Training Options for Disaster Education
Online Training Options for Disaster EducationOnline Training Options for Disaster Education
Online Training Options for Disaster Education
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 

Similaire à Small Business Owners – Don’t Get Caught With Out Data Security.

Similaire à Small Business Owners – Don’t Get Caught With Out Data Security. (20)

FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023How To Improve WooCommerce Security? Complete Security Checklist for 2023
How To Improve WooCommerce Security? Complete Security Checklist for 2023
 
Secure End User
Secure End UserSecure End User
Secure End User
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Website Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website SafeWebsite Security Certification The Key to Keeping Your Website Safe
Website Security Certification The Key to Keeping Your Website Safe
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Cybersecurity Measures Every Small Business Must Take
Cybersecurity Measures  Every Small Business Must TakeCybersecurity Measures  Every Small Business Must Take
Cybersecurity Measures Every Small Business Must Take
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 

Dernier

!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Dernier (20)

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 

Small Business Owners – Don’t Get Caught With Out Data Security.

  • 2. Small Business Owners – Don’t Get Caught With Out Data Security. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 3. 15 Proactive ways to secure customer data 1. Review and follow the laws governing data security · Federal Trade Commission Act (FTC Act) · Fair Credit Reporting Act (FCRA) · Gramm-Leach-Bliley Act (GLBA) · FTC Disposal Rule · Other federal laws (HIPAA, DPPA, FERPA) · State laws Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 4. 2. Know what you have and who has access to it Check files and computers for what information you have; and where it’s stored. Don’t forget portable devices and offsite locations. 3. Keep only what you need for to streamline storage Collect only what you need and keep it only for the time you need it. Scale down what you store on devices connected to the Internet. 4. Partner with OnGuard Online The federal government and the technology industry have teamed up to prepare materials that can help guard against Internet fraud, secure computers, and protect personal information. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 5. 5. Protect your computer by installing a firewall Firewalls help keep hackers from using your computer to send out personal information without your permission. 6. Properly dispose of what you no longer need Make sure papers containing personal information are shredded. Be sure to use commercial shredding companies for large volumes of paper. 7. Properly erase data you no longer need Use disk wipe software to clean, delete and erase data, files or programs on computers and portable storage devices. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 6. 8. Guard your laptop There are a number of vendors that offer stealthy software solutions that enable your laptop to check in to a tracking center periodically using a traceable signal. 9. Protect, audit and certify the security of your website The ScanAlert product sweeps your website for potential security flaws, and then posts a “Hacker Safe” security logo if the site comes up clean. 10. Verify information handling practices If you give another organization access to your records or computer network, you should make sure they have good security programs too. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 7. 11. Use Qualys free tool to check your systems Qualys’ free SANS Top 20 Scan detects the 20 most dangerous vulnerabilities, provides a detailed report with information for each vulnerability and links to verified fixes. 12. Automate the process of updating security software Use automation to make sure systems maintain their secure configuration, remain fully patched with the latest version of the software (including keeping anti-virus software up to date). 13. Attend security awareness training Security awareness training is designed to educate business owners on the appropriate use, responsibilities and ongoing protection of customer data. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 8. 14. Use a Secure Sockets Layer (SSL) A SSL certificate ensures that you are communicating with the intended party and not an imposter by authentication and encryption. 15. Use off site storage Your critical information goes to a secure central data storage facility that manages, and protects you customer information, business data, and records. Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder
  • 9. Thank you for watching!
  • 10. For more Savvy Online Business Building Tips Visit www.SavvyBizBuilder.com Facebook.com/SavvyBizBuilder www.SavvyBizBuilder.com Twitter.com/SavvyBizBuilder