{"id":315,"date":"2015-06-25T07:11:35","date_gmt":"2015-06-25T07:11:35","guid":{"rendered":"http:\/\/www.advancedglobalsecurity.com\/florida\/?p=315"},"modified":"2015-06-25T07:15:09","modified_gmt":"2015-06-25T07:15:09","slug":"dont-be-a-victim-or-contributor-to-the-next-recent-data-breach","status":"publish","type":"post","link":"http:\/\/www.advancedglobalsecurity.com\/florida\/dont-be-a-victim-or-contributor-to-the-next-recent-data-breach\/","title":{"rendered":"Don&#8217;t be a Victim or Contributor to the Next Recent Data Breach!"},"content":{"rendered":"<p>Unfortunately, <a href=\"http:\/\/www.washingtonpost.com\/blogs\/federal-eye\/wp\/2015\/06\/23\/effort-to-improve-security-for-federal-employee-records-at-high-risk-of-failure-audit-finds\/\" target=\"_blank\">impenetrable firewalls and up to the minute defensive software<\/a> aren\u2019t enough to keep organization (and consumers personal information) safe from cyber attacks and data breaches. Information technology teams could be doing every that is needed correctly, but companies may still be at risk from internal threats \u2013 because just one employee lets their guard down and compromises the safekeeping of personal data.<br \/>\n&nbsp;<br \/>\nIt\u2019s a fact that most data breaches and other security incidences occur because of employee negligence. Many companies simply do not have privacy and data protection awareness training for employees and others with access to sensitive information. Even more companies do not have programs in place to train customer service staff to deal with consumer inquiries regarding a data breach after it has occurred.<br \/>\n&nbsp;<br \/>\nCybersecurity and data breach preparedness is everyone\u2019s job, June is National Internet Safety Month; the perfect time to foster a proactive culture of vigilance among consumers and more importantly employees, who hold many people\u2019s information in their hands. Since it is likely that nearly everyone in just about every business and organization uses the Internet in some capacity, it is imperative that they be aware of personal cyber risks.<br \/>\n&nbsp;<br \/>\nThis month, Advanced Florida Security and Investigation believes it is imperative to consider our personal responsibility in the following areas and also in providing training programs on these vital topics if you are a business owner or manager:<br \/>\n\u2022\t<strong>BYOD (Bring Your Own Device)<\/strong> \u2013 Nowadays, it is very common for employees to use personal devices such as smartphones and tablets to do work activities such as send emails and access personal data on company servers. Every organization should have a clearly defined BYOD policy and all employees should be aware of expectations and limitations regarding their use of personal devices at work.<br \/>\n\u2022\t<strong>Control personal Internet use at work<\/strong> \u2013 During lunch hours and coffee breaks, employees are typically free to shop online and check their personal emails. They may also be doing these personal activities during down times at work, but are they using company systems to do it? Personal Internet activity at work does not just threaten productivity, but more importantly, it may put your systems at risk, too. Bogus websites (such as was used in the <a href=\"http:\/\/www.latimes.com\/business\/hiltzik\/la-fi-mh-anthem-is-warning-consumers-20150306-column.html#page=1\" target=\"_blank\">Anthem mega data breach<\/a> late last year and the <a href=\"http:\/\/news.yahoo.com\/u-employee-data-breach-tied-chinese-intelligence-sources-162852749--finance.html\" target=\"_blank\">U.S employee data breach<\/a> this year), suspicious links and email attachments can expose your data and systems to viruses, malware and data breaches.<br \/>\n\u2022\t<strong>Route all software downloads through the IT team<\/strong> \u2013 As part of a company\u2019s cybersecurity policies, employees understand that only the IT team is authorized to download software. If an employee wishes to download business-related software to his or her work PC, they should have IT review the software first and then download it for them. This not only helps ensure that the IT team is aware of every piece of software in your system but that it is safe to download and downloaded correctly.<br \/>\n\u2022\t<strong>Email information security<\/strong> \u2013 Email is a primary mode of communication in many offices, and it is definitely not unusual for key employees to handle hundreds of emails each and every day. Policies should be established as to what type of information can be shared via email. This will help to protect business\u2019 sensitive data.<br \/>\n\u2022\t<strong>Password protection<\/strong> \u2013 Compromised employee credentials has been linked to many data breaches such as the <a href=\"http:\/\/www.latimes.com\/business\/hiltzik\/la-fi-mh-anthem-is-warning-consumers-20150306-column.html#page=1\" target=\"_blank\">Anthem mega data breach<\/a> that occurred late last year and was disclosed earlier in 2015. Recently, a <a href=\"http:\/\/news.yahoo.com\/u-employee-data-breach-tied-chinese-intelligence-sources-162852749--finance.html#\" target=\"_blank\">U.S employee data breach tied to Chinese intelligence<\/a> involved a similar modus operandi. Investigators believe that in both cases, hackers registered deceptively named websites to capture employee names and passwords. It is absolutely vital that employees not only protect their logon IDs and passwords, but that they craft strong passwords and change them regularly to ensure that personal information is secure.<br \/>\n&nbsp;<br \/>\nWhile June is a great time to focus on cybersecurity, the focus and dialogue between employers and employees should continue year round. As individual consumers, we should also be aware of how we access and use data. Data breaches pose significant risks to everyone. Every company should strive to ensure their organization is well protected and every consumer should strive to protect their personal information as best they can. For more information and assistance if you have been the victim of a cyber attack or data breach, <a href=\"http:\/\/www.advancedglobalsecurity.com\/florida\/contact-us\/\" title=\"Contact Us\">contact Advanced Florida Security and Investigation<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unfortunately, impenetrable firewalls and up to the minute defensive software aren\u2019t enough to keep organization (and consumers personal information) safe from cyber attacks and data breaches. Information technology teams could be doing every that is needed correctly, but companies may still be at risk from internal threats \u2013 because just one employee lets their guard [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[1],"tags":[],"class_list":["post-315","post","type-post","status-publish","format-standard","hentry","category-blog","entry"],"_links":{"self":[{"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/posts\/315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":5,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/posts\/315\/revisions"}],"predecessor-version":[{"id":320,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/posts\/315\/revisions\/320"}],"wp:attachment":[{"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/media?parent=315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/categories?post=315"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.advancedglobalsecurity.com\/florida\/wp-json\/wp\/v2\/tags?post=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}