0% found this document useful (0 votes)
51 views1 page

Data Theft Prevention Checklist

This document provides a comprehensive checklist for preventing data theft with recommendations in three areas: Storage and Access, Technology, and People. It advises setting up access roles and encrypting sensitive information, protecting networks and devices with passwords/firewalls/antivirus, and training employees on secure practices while prohibiting oversharing on social media. The checklist draws from experts to help organizations implement policies and procedures to safeguard their sensitive data and avoid the rising costs of data breaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views1 page

Data Theft Prevention Checklist

This document provides a comprehensive checklist for preventing data theft with recommendations in three areas: Storage and Access, Technology, and People. It advises setting up access roles and encrypting sensitive information, protecting networks and devices with passwords/firewalls/antivirus, and training employees on secure practices while prohibiting oversharing on social media. The checklist draws from experts to help organizations implement policies and procedures to safeguard their sensitive data and avoid the rising costs of data breaches.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Data Theft Prevention Checklist

With the average cost of a data breach at $3.8 million and rising every year, it’s more important than ever for companies to have
policies and procedures in place to protect their sensitive information. We’ve consulted with top information security experts to
create this comprehensive checklist for preventing data theft in your organization.

Storage and Access Technology People


Shred the following: Protect all computers and devices with Require strong passwords at least eight
passwords and enable remote wipe capabilities. characters long with uppercase and lowercase
• Mail with a name and address.
letters, numbers and special characters.
• Luggage tags Install or enable a firewall to keep outsiders
from accessing your company network.
• Trip itineraries and boarding passes Enforce a “clean desk” policy prohibiting
employees from keeping working papers and
• Credit offers Protect your wireless network with a
sensitive documents in view.
• Price lists password and use encryption and security to
hide your wireless network from outsiders.
• Vendor payment stubs and invoices Train employees to recognize and report
Encrypt all sensitive information being “phishing”, “smishing” and other forms of
• Cancelled checks
transferred. Install encryption on all company social engineering.
• Receipts laptops, mobile devices and removable media.
Set up a separate wireless “guest” network
Have your IT Department set up access roles Use a proxy to access the internet in public for personal devices to keep your company
to restrict access to your sensitive data to only places where wifi may be shared by other users. network safe.
those who require it.
Activate two-factor authentication.
Find out what you need to protect through Implement social media policies to prevent
an audit or assessment of your data. employees from oversharing on social media
Prohibit the transfer of personal information,
or falling for social media scams and frauds.
such as social security numbers or medical
Hold third parties and contractors your information, via portable devices.
company engages to the same strict data Be nice to your employees. A disgruntled
privacy controls you implement in your own employee can be the most dangerous
Purchase and use up-to-date anti-virus
organization. vulnerability in your data protection program.
software and anti-spyware.

For information on i-Sight’s products and services please contact us at 1-800-465-6089, [email protected] or visit our website http://www.i-sight.com

You might also like