What Is a Data Breach and Where do These Breaches Occur?

A data breach takes place when an unauthorized individual or group obtains confidential, secure information that should not be public knowledge. Unfortunately data thieves continue to hound companies and individuals here in Georgia and across the rest of the United States.

In 2017, Identity Theft Resource Center (ITRC) statistics show that more than 174 million confidential records were exposed; a huge climb from the 36.6 million that were reported in 2016.

So how are these breaches occurring and where do they take place?

  • Viewing Computer Screen:Hacking through physical viewing is a thing; in fact physically spying on someone’s computer screen occurs all of the time. All one needs to see is log-in credentials and very quickly additional sensitive information can be accessed. To combat this, we encourage that your workplace adopts visual privacy policies with the addition of a Clean Desk Policy. It’s also a good idea to supply privacy filters, and limit workplace visitors. All staff should be thoroughly trained on how to store, secure and and dispose of company data.
  • Fitness Tracking Device: The ever growing network of physical devices that include an IP address for internet connectivity means that if security is lacking, cyber criminals can hack and intercept if and when connected to the internet. IoT devices may refer to Fitbit, GPS running watches, medical devices, or games like Pokémon Go. Be sure your staff is familiarized with these risks and security concerns, and always investigate an electronic device such as these prior to buying. Security features should be set up immediately and it is suggested that you change default passwords regularly.
  • Employees:Sadly, those staff that you trust in some cases will steal as well. Often the reasons behind doing so include personal financial struggles or because of a low paid position. Whether it is medical data or client social security numbers that are stolen and then sold to an outside party to commit fraud, or an employee error that involves an distrustful individual gaining access to information mistakenly, employees can cause breach knowingly or unknowingly.  To combat this issue, it’s crucial that you supply regular training for your staff in relation to cyber security. You may wish to filter emails for spam and implement a new policy for file sharing that doesn’t involve attachments via email.
  • Garbage/Recycling Bin:  This may be the biggest culprit; are all of your staff handling and disposing of confidential material securely? All confidential matters must be destroyed securely before they are tossed away. Throwing old files into the recycling or garbage bin can leave your information extremely susceptible to theft. For compliance purposes and for the protection of your company, we highly recommend that you partner with a trusted and reliable document shredding company.

At Shred A Way in Columbus, we provide our clients with document shredding services, record storage solutions, and media destruction solutions. We are your solution for information destruction services you can count on. Your information will be 100% protected when you allow our professionals to help.

Call 706-577-9668

Share This Post