Question

WEEK 4: PRIVACY What methods can be put into place to ensure a consumer’s sensitive data...

WEEK 4: PRIVACY

What methods can be put into place to ensure a consumer’s sensitive data is adequately protected?

Please Text format (No Images/Hand Written)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:-

What methods can be put into place to ensure a consumer’s sensitive data is adequately protected:-

1. Identify Sensitive Data

Every company has sensitive data, including financial records, employee personal information, or consumer credit card details. Make sure you know where this information is stored, whether on computers, laptops, or servers, and that adequate protection exists at each level.

2. Control Access

Once you know where this data resides, make sure you know who has access. Never give anyone, even an IT administrator, blanket access to all data with no oversight. Keep records about who uses data as well and when they use it, so a trail exists if files go missing or are compromised. Limiting access also helps prevent unintended disclosure of information by employees using social media sites or personal mobile devices.

3. Don’t Ignore Mobile

The rising bring-your-own-device (BYOD) trend means more mobile devices than ever in the workplace. As a result, many employees keep both work and personal data on phones and tablets, but they often don’t have sufficient security measures in place to prevent an attack or a loss. Owners can’t stop mobile use, but they can create solid at-work use policies. Several options exist for handling mobile data, including secure apps and virtualization technology that “splits” a device into two separate, equally secure parts.

4. Consider the Cloud

Despite some of the negative security press surrounding “the cloud”, cloud storage is a real option. By storing information offsite and under a robust cloud provider agreement, companies not only limit the chance of an attack, but they have access to data backup in the event of a disaster.

5. Encrypt What You Have

If you do choose to keep data onsite, encrypt it. Many databases, applications, and security suites offer data encryption services. Use a secure encryption technique so that even if information is stolen, it can’t be easily compromised.

6. Hire the Right Help

For many small business owners, hiring a dedicated IT pro makes sense to manage compliance and security issues. Before bringing on any new talent, however, make sure to do your homework. Conduct background checks and check references. In-house data theft remains a huge problem for businesses.

7. Control Downloads

Just as too-broad access can expose your data, so can downloading data that contains spyware. Imposing strict download controls is one way to sidestep this problem. In the long term, companies are better served by creating a culture of security and protection, one where every employee knows his role and understands the value of downloading apps and software only from reputable sites.

8. Think About Paper

In a digital world, many small business owners forget the power of paper. Physical statements that contain credit card data or personal information can be recovered from trashcans or recycling bins. Shred all sensitive documents with a quality, high-security shredder once you transfer them to a digital format, and employ a secure shredding company to dispose of the remains.

9. Secure Your Network

One of the easiest ways to do business in a small office is by using a wireless network. If left unsecured, however, these networks are also easy to attack. Make sure your wireless network has a password, and use WPA2 encryption rather than WEP.

10. Update Passwords

According to Trustwave, “Password1” remains popular because it meets most automated security system requirements. Small business owners should periodically review all passwords being used in their system and change those that aren’t secure. Change passwords once every few months, especially if your employees leave the company or use third-party providers for IT functions.

Add a comment
Know the answer?
Add Answer to:
WEEK 4: PRIVACY What methods can be put into place to ensure a consumer’s sensitive data...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Understanding that some safety features can be bypassed, what other safe-guards can be put into place...

    Understanding that some safety features can be bypassed, what other safe-guards can be put into place in ensure patient safety? Name three methods.

  • What should healthcare providers consider putting into place to protect health record data to ensure that...

    What should healthcare providers consider putting into place to protect health record data to ensure that the health record integrity remains intact as well as the health record data is available so that the patient can be treated?

  • PLEASE EDIT THE LAST 3 METHODS WHERE I PUT STARS AND DO WHAT THE COMMENTS SAY....

    PLEASE EDIT THE LAST 3 METHODS WHERE I PUT STARS AND DO WHAT THE COMMENTS SAY. THE CODE IS IN JAVA PROGRAMMING LANGUAGE. import java.util.AbstractList; import java.util.List; import java.util.RandomAccess; import java.lang.RuntimeException; import java.util.Arrays; public class Vector<E> extends AbstractList<E> implements List<E>, RandomAccess {    protected Object[] data; protected int size; public int size() {     return size; }    private void rangeCheck(int index) {     if (index < 0 || index >= size) throw new IndexOutOfBoundsException(""); }    @SuppressWarnings("unchecked") private E...

  • This week, you will start a course project. For this project, you will design and develop...

    This week, you will start a course project. For this project, you will design and develop a small website for a travel company. You will develop this website across the span of the course, building new project components each week, until you have a live, hosted website at the end of the course. This project is designed to replicate real-life situations where the clients provide only a few of their requirements and expect a prototype to be developed. Scenario Express...

  • Week 13 Healthcare Ethics Week 13 Journal Entry about Full o Week 13 Journal Entry about...

    Week 13 Healthcare Ethics Week 13 Journal Entry about Full o Week 13 Journal Entry about Full Disclosure Create Journal Entry Journa Journal Instructions GRAD Read about Full Disclosure and watch the video links within the Week 12 folder. You may also find other videos and journal articles that address full disclosure related to health care. This assignment is due on April 14, 2019 at 11:59 pm. CO Write a jourmal document that outlines different aspects of full disclosure in...

  • can you please answer those questions . i will apperciate your help. NSG100 Week 4 Written...

    can you please answer those questions . i will apperciate your help. NSG100 Week 4 Written Assignment Review View AaBbCcDdE AaBbCcDdE AaBbCcD AaBbCc Normal No Spacing Heading 1 Heading 1 2 4 6 The first section has to do with delegation, which we will have covered in discussing ethical provisions 4-6. This is a very important part of how you as a nurse will make decisions about patient care and accountability for that care. Nursing school and licensing questions will...

  • Can you please put into detail of what symbols would need to go into the calculator?...

    Can you please put into detail of what symbols would need to go into the calculator? Activity Two: Discrete Probability Distributions in Action Example #2) Suppose a health insurance company can resolve 60% of claims usinga computerised system, the remaining needing work by humans. day, 10 claims arrived, assuming claims are independent, what is the probablity that (Adapted from NewBold et al., 2003, p. 149): On a particular Q2.1) Either 3 or 4 (inclusive) claims require work by a human?...

  • Protected areas aim to safeguard biodiversity, preserve ecosystem services and ensure the persistence of natural heritage...

    Protected areas aim to safeguard biodiversity, preserve ecosystem services and ensure the persistence of natural heritage [1]. Despite their essential role in conservation, the allocation of resources to cope with an increasing variety of regular activities and unforeseen circumstances remains generally insufficient [2], severely affecting overall effectiveness [3]. Besides, protected areas subjected to international and national agreements must resolve their acquired responsibilities to maintain their legal status [4]. Hence, there is a demand for cost-effective, versatile and practical initiatives to...

  • Questions 1 Provide two methods Sue can use to assist Kate to be comfortable with Ginny's...

    Questions 1 Provide two methods Sue can use to assist Kate to be comfortable with Ginny's decision to to remove her from the day program temporarily. Questions 2 how could Sue assist Ginny and Kate to access an advocacy service? Questions 3 how could Sue assist Kate and Ginny to use a complaint mechanism to resolve the issue? Questions 4 why is it important to protect Kate's privacy and confidentiality regarding making a complaint? Questions 5 What form of abuse...

  • Allowed 4 questions please answer all 4 1. 2. 3. 4. Hedonic price methods may be...

    Allowed 4 questions please answer all 4 1. 2. 3. 4. Hedonic price methods may be used to do all of the following EXCEPT Select one: a. use travel cost and quantity of visits can to estimate demand curve for recreation site b. estimate the impact of pollution on home prices c. indicates how workers willingly expose themselves to elevated risk levels to have more resources that income can buy. d. estimate the impact of climate change on agricultural land...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT