503.223.5008
Facebook
Twitter
LinkedIn
  • Home
  • IT Services
    • Managed IT Services
      • Help Desk Services
      • Disaster Recovery Services
      • IT Security Services
      • Phishing Solutions
      • Migration & Deployment
      • Server & Network Solutions
      • Structured Cabling Solutions
      • Vendor Management
    • Voice Solutions
      • Unified Communication Services
      • VoIP Phone Services
      • Call Center
    • Cloud Computing
      • Microsoft 365 Support
      • Virtualization Support
    • Virtual CIO Services
    • HIPAA & PCI Compliance
  • Industries
    • Healthcare IT Solutions
    • Nonprofit IT Support
    • SMB IT Services
    • Manufacturing IT Services
    • Government IT Solutions
  • About
    • Blog
    • Our Team
    • Resources
  • Contact
  • Support

The Importance of Data Hygiene

February 15, 2021Leeann CapogrossiBlogNo Comments

How’s your hygiene?
By now you’ve become expert at handwashing, along with an all-out effort on air and surface cleaning.  And if you’ve been working from home the last year or so, chances are you’ve had to tidy up the homestead and make a shift in how you manage the work/life balance.

That’s all well and good, but how are you looking after your data hygiene? 

Data hygiene, as defined by the International Data Sanitization Consortium, is the process of making certain all inactive, incorrect or duplicate data is managed appropriately and assigned to the appropriate stage for storing, archiving or destroying.  This is an ongoing process that must be managed carefully and correctly.  If it is not, then you may be leaving your organization vulnerable to a cyberattack.

There are many ways one can leave the door open to attack.
Some are seemingly obvious; others are less known but widespread.

A recent review of a local organization revealed hundreds of former employee user credentials with functional and active passwords.  This could be a potential danger if the information were to get into the hands of a cybercriminal or used by a disgruntled employee who is able to access the company network.

Old, yet usable data is one area that tends to fall by the wayside for businesses, mainly because it’s out of sight and out of mind. But that’s exactly the kind of thing that can be very useful to those looking to wreak havoc on a company.

In addition to data, we often see outdated software and firmware in place that is still in use, but has not been updated, lacking the latest security patches and leaving exploitable holes wide open to outsiders.  What does that mean for your company? All it would take is a well-crafted phishing email that catches one of your employees off guard; thus allowing malware to enter your network, leaving your data vulnerable.

The stats are sobering: 

  • When data is compromised, an organization’s reputation can be tarnished by a measurable 17 to 31 percent, representing significant loss of trust.
  • The average cost of a significant data breach is over $3 million.
  • Two thirds of customers are willing to switch vendors when learning of a failure to protect customer data.
  • And the biggie:  Up to 60 percent of small businesses fail within 6 months of a major data breach.

Keeping a Clean House
In business, keeping an ultra-clean house is not an option! It’s a necessary requirement. At Pavelcomm, we’ve seen many different situations that could be potentially compromising.  All too often, however, our services are called upon after a breach has occurred. The good news is that we can then begin to develop a strategy to maintain safe practices, set up a secure network (with protocols in place to keep it that way), and educate all users so they know how to handle different situations and what to look for in order to prevent an attack from occurring.

While having a plan to deal with a future breach is critical to survival (a cyber policy), it is equally important to reduce as many attack vectors as possible.

Pavelcomm specializes in helping protect you and your customers’ data from compromise as well as planning to limit potential damage.  Are you looking to improve your data housekeeping to limit exposure to the unthinkable?   Contact us today for a consultation.

 

 

: breach, cyberattack, data, network, security, software
Leeann Capogrossi
Previous Post How to Drive Remote Work Engagement Next Post 5 Data Security Risks When Working Remote and How You Can Defend Against Them

Related Articles

How to Avoid Ransomware in Your Email

August 6, 2015Pavelcomm Staff
Backup and Disaster Recovery

Can Your Small Business Survive a Data Disaster?

June 28, 2019Pavelcomm Staff

Minimizing Security Risks for an At-Home Workforce

July 21, 2020Leeann Capogrossi

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Happy Employees = Happy Bottom Line: A Case for the Hybrid Workforce January 30, 2023
  • How a Hybrid Workplace Can Benefit Your Business and Employees January 9, 2023
  • 3 Ways You Can Grow Your Business in 2023 December 1, 2022
  • Cloud 101: How to Leverage Innovative Cloud Technologies November 8, 2022
  • The Oregonian Names Pavelcomm a Winner of The Oregon and Southwestern Washington Top Workplaces 2022 Award October 10, 2022

1640 NW 14th Ave.
Portland, OR 97209

503.223.5008

Recent Posts

  • Happy Employees = Happy Bottom Line: A Case for the Hybrid Workforce January 30, 2023
  • How a Hybrid Workplace Can Benefit Your Business and Employees January 9, 2023
  • 3 Ways You Can Grow Your Business in 2023 December 1, 2022

Follow Us Today

Facebook
Twitter
LinkedIn

© - Pavelcomm. All rights reserved. | Privacy Policy