Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Author Archive

Mar
14

Security Talk #5 – Shred, Shred, Shred

Posted by: | Comments Comments Off on Security Talk #5 – Shred, Shred, Shred

Did you know that the Federal Trade Commision with their Fair and Accurate Credit Transactions Act (FACTA) requires that your company shred documents with personal information? valid-rss

Comments Comments Off on Security Talk #5 – Shred, Shred, Shred
Feb
21

Security Talk #3 – Check Washing and Security Pens

Posted by: | Comments Comments Off on Security Talk #3 – Check Washing and Security Pens

Check washing is where a thief will steal a company’s check, remove the “Pay To” name and amount, and then change the information to where the thief gets paid far more then origianlly specified. Ball point pen inks are the problem. Please listen to the following audio for information about protecting your checks.
valid-rss

Categories : Audio Interviews
Comments Comments Off on Security Talk #3 – Check Washing and Security Pens
Feb
14

Remote Network Access vs. Remote PC Access

Posted by: | Comments Comments Off on Remote Network Access vs. Remote PC Access

Yes, there is a difference between Remote Network Access (RNA) and Remote PC Access (RPCA). RNA is designed for businesses that require their employees to security access the company’s entire network while taking advantage of the security that IT has incorporated. RPCA allows a remote user to use one computer to connected to another computer which in-turn may connect to the the company’s network. The security risk is how secure the network connecting computer and if the latest anti-virus software is up-to-date. RPCA can also be in violation to the privacy protection laws because it puts security in the hands of the employee and not the IT expert.

With RNA, IT has full control of the security and any connecting computer will have to go through the network’s protections like complex logon ID’s, anti-virus, anti-malware and other security software. RNA also saves money in that the connecting PC is not left running 24 hours waiting for a connection.

RPCA are good for the home and very small office, but if you are a business that needs to protect customer’s confidential files then give serious consideration to a RNA solution.

Comments Comments Off on Remote Network Access vs. Remote PC Access
Feb
10

Businesses Pay Higher Data-Breach Costs

Posted by: | Comments Comments Off on Businesses Pay Higher Data-Breach Costs

The Ponemon Institute recently released their 2008 study on the total costs a business pays for a data breach. After interviewing 43 companies the 2008 cost rose 2.5% to $6.6 million per breach or $202 per record compromised over 2007 costs.

Due to state regulations, businesses must notify customers, employees and vendors that their confidential personal data has been lost, stolen or compromised. The costs reported by the Ponemon Institute are incurred no matter if the records were actually used in committing identity fraud. Read More→

Categories : Security Stats
Comments Comments Off on Businesses Pay Higher Data-Breach Costs
Feb
07

Reg Flags are Coming! Red Flags are Coming!

Posted by: | Comments Comments Off on Reg Flags are Coming! Red Flags are Coming!

Enforcement of the “Red Flag Rules” starts May, 1st 2009. The Red Flag Rules specifies that “financial institutions and creditors” protect an individual’s personal information from identity theft by raising a “red flag”. The companies must establish policies and procedures to recognize, detect, and respond to an identity theft attack. However, the scope of who has to comply may be larger than originally thought. Read More→

Comments Comments Off on Reg Flags are Coming! Red Flags are Coming!
FLEXCAP
SiteLock