Sales: 503.336.9733   Support: 503.223.5008
Client Portal
Facebook
Twitter
Google+
LinkedIn
IT support Portland OregonPortland IT Services
  • Home
  • IT Services
    • Managed IT Services
      • Help Desk Services
      • Disaster Recovery Services
      • IT Security Services
      • Phishing Solutions
      • Migration & Deployment
      • Server & Network Solutions
      • Structured Cabling Solutions
      • Vendor Management
    • Voice Solutions
      • Unified Communication Services
      • VoIP Phone Services
      • Call Center
    • Cloud Computing
      • Microsoft 365 Support
      • Virtualization Support
    • Virtual CIO Services
    • HIPAA & PCI Compliance
  • Industries
    • Auto Dealers
    • Healthcare
    • Non-Profit
    • Small Business
  • About
    • Blog
    • Our Team
    • Events
  • Contact
  • Support

Tips for Better Hygiene (Data Hygiene, that is)

February 16, 2021Leeann CapogrossiBlog

How’s your hygiene?
By now you’ve become expert at handwashing, along with an all-out effort on air and surface cleaning.  And if you’ve been working from home the last year or so, chances are you’ve had to tidy up the homestead and make a shift in how you manage the work/life balance.

That’s all well and good, but how are you looking after your data hygiene?
Data hygiene, as defined by the International Data Sanitization Consortium, is the process of making certain all inactive, incorrect or duplicate data is managed appropriately and assigned to the proper stage for storing, archiving or destroying.  This is an ongoing process that must be managed carefully and correctly.  If it is not, then you may be leaving your organization vulnerable to a cyberattack.

There are many ways one can leave the door open to attack.
Some are seemingly obvious; others are less known but widespread.

A recent review of a local organization revealed hundreds of former employee user credentials with functional and active passwords.  This could be a potential danger if the information were to get into the hands of a cybercriminal or used by a disgruntled employee who is able to access the company network.

Old, yet usable data is one area that tends to fall by the wayside for businesses, mainly because it’s out of sight and out of mind. But that’s exactly the kind of thing that can be very useful to those looking to wreak havoc on a company.  In addition to data, we often see outdated software and firmware in place that is still in use, but has not been updated, lacking the latest security patches and leaving exploitable holes wide open to outsiders.  What does that mean for your company? All it would take is a well-crafted phishing email that catches one of your employees off guard; thus allowing malware to enter your network, leaving your data vulnerable.

The stats are sobering: 

  • When data is compromised, an organization’s reputation can be tarnished by a measurable 17 to 31 percent, representing significant loss of trust.
  • The average cost of a significant data breach is over $3 million.
  • Two thirds of customers are willing to switch vendors when learning of a failure to protect customer data.
  • And the biggie:  Up to 60 percent of small businesses fail within 6 months of a major data breach.

Keeping a Clean House
In business, keeping an ultra-clean house is not an option! It’s a necessary requirement. At Pavelcomm, we’ve seen many different situations that could be potentially compromising.  All too often, however, our services are called upon after a breach has occurred. The good news is that we can then begin to develop a strategy to maintain safe practices, set up a secure network (with protocols in place to keep it that way), and educate all users so they know how to handle different situations and what to look for in order to prevent an attack from occurring.

While having a plan to deal with a future breach is critical to survival (a cyber policy), it is equally important to reduce as many attack vectors as possible.

Pavelcomm specializes in helping protect you and your customers’ data from compromise as well as planning to limit potential damage.  Are you looking to improve your data housekeeping to limit exposure to the unthinkable?   Contact us today for a consultation.

 

: cyberattack, data breach, network, security, software
Leeann Capogrossi
Previous Post How to Drive Remote Work Engagement Next Post Remote Work Collaboration: Improve the Way Your Team Works Together While Apart 

Related Articles

How to Avoid Ransomware in Your Email

August 6, 2015Pavelcomm Staff

Minimizing Security Risks for an At-Home Workforce

July 21, 2020Leeann Capogrossi

Recent Posts

  • Remote Work Collaboration: Improve the Way Your Team Works Together While Apart  February 26, 2021
  • Tips for Better Hygiene (Data Hygiene, that is) February 16, 2021
  • How to Drive Remote Work Engagement January 21, 2021
  • 3 Ways to Leverage Your Technology in 2021 December 4, 2020
  • The Dos and Don’ts of Communications November 2, 2020
managed IT services Portland Oregon

1640 NW 14th Ave., Portland, OR 97209

Sales: 503.336.9733
Support: 503.223.5008

Recent Post

  • Remote Work Collaboration: Improve the Way Your Team Works Together While Apart  February 26, 2021
  • Tips for Better Hygiene (Data Hygiene, that is) February 16, 2021
  • How to Drive Remote Work Engagement January 21, 2021

Follow Us Today

Facebook
Twitter
Google+
LinkedIn

© - Pavelcomm. All rights reserved. | Privacy Policy