SAFEGUARDING CLIENT INFORMATION – THE LOW-TECH WAY

Even though your business uses the latest cyber-security systems to protect confidential client data, low-tech thieves might well be tapping into this information without your knowledge: “Dumpster divers” rummage through company trash for discarded passwords and records. ATM cardholders often write their PIN code on the card itself. People hold loud “confidential” conversations in coffeehouses or walking down the street.

Have you ever considered how much of your customers’ private information might be left lying around the office? Fellow employees, cleaning crews, other customers, and repair people can easily walk by an absent employee’s desk and see confidential information scattered about or left on the computer screen. While you’ve invested in software to protect files against hackers, those same files could be sitting open in your office for all to see – and don’t overlook the most obvious and massive security breach in any organization – human error.

Walk through your business after hours or while employees are at lunch and see how much information is left openly accessible. Sit in the middle of the office or at the next booth or table at lunch, and listen for how much of your employee’s conversations (and possible confidential customer information) you can overhear.

Then decide what you can do to minimize this risk. Make sure that desktops are clear at night; add password-protected screen savers to your computers (and change the passwords often); and remind employees to be sensitive about what they reveal in public conversations.

It’s far better to clean up this problem now than to have it clean you out later.

Our agency’s risk management specialists stand ready to offer their advice at any time.

Need insurance for You, Your Family or Your Business?
We can match you to a qualified, local insurance expert!
Further Reading
Tax season is here, and it's time to start thinking about getting your tax paperwork in order. If you itemize your deductions and spent a large portion of your 2015 budget on medical-related expenses, you might get a tax break. Learn more about the g...
The majority of job applications today are completed online. It's easy to simply enter your information, upload your resume and hit send. What happens to your personal information, though? If someone accesses your full name, social security number, a...
According to research from the Employee Benefit Research Institute (EBRI), a non-profit organization that conducts research and assembles and disseminates information related to employee benefits, those most likely to seek information on American hea...
Building information modeling (BIM) software provides a digital three-dimensional, real-time tool that contractors, building owners, architects, and engineers can use to develop an overall view of a building throughout the design and construction pro...
Your customers entrust their personal data to you and your company. Your employees may easily share information, though, particularly if you operate an open office with little privacy. Protect your customers’ information and identities when you follo...