Data Protection: Your Best Line of Defense Starts Inside

Data Protection: Your Best Line of Defense Starts Inside

Investing in information security has never been more critical. The COVID-19 pandemic has reshaped the way we work, stressing our systems, connections, and networks. Cyberattacks continue to make headlines, and physical data breaches remain a concern.

The results of a 2021 survey of North American business leaders and consumers conducted by Shred-it, a Stericycle solution, emphasize how important it is that security leaders understand the high stakes at play -not only to protect their business performance, but also to safeguard their reputation and retain their customers.

The survey revealed that 4 out of 10 business leaders rate the risk of an attempted data breach in the next 12 months as a '4' or '5' on a 5-point risk scale, with '5' being the highest risk. This may leave businesses unprepared, as more than half of those surveyed do not have an incident response plan. At the same time, research tells us that the stakes have never been higher. More than 80% of consumers, for example, said they decide whom to do business with based on a company's reputation for data security.

While much focus is spent staving off malicious outsiders’ attempts to compromise systems and gain unauthorized access to data, the most significant risk revealed in the survey – and the most cited cause of a breach – is internal. A majority of breaches were attributed to malicious insiders (53%), followed by trusted external partners (40%), and employee error (22%).

Your Best Line of Defense
Without the proper knowledge, business processes, and controls, employees and trusted vendors are susceptible to attacks by malicious actors, leaving organizations vulnerable. Despite policies and training, employees struggle to put learnings into practice. Fifty percent (50%) of business leaders surveyed indicated that the lack of understanding of the threats and risks to the organization is the biggest barrier to employees following information security policies.

Therefore, your best line of defense starts inside.

The Playbook for Building Information Security and Accountability
Equip your employees as well as trusted vendors and partners to become ambassadors for information security by focusing on these seven critical steps:

  1. Establish clear internal communication lines. In order to effectively protect against threats, an organization first needs to be able to detect, collect information about, and investigate anomalies. To do this, strong collaboration and communication between business operations, the IT department, and Security is critical.
  2. Employ an incident response plan. Once an issue is identified, an incident response plan is mission-critical to your ability to respond to and mitigate the damage in the event of a breach. Build and implement a response plan that is both cross-functional and that is customized to the needs of your organization. Participation from all areas of the business (HR, Finance, Operations, IT, Legal, etc.) is key to ensuring that business impacts are identified, major issues are addressed, and that nothing goes overlooked.
  3. Implement controls to protect against insider threats. Protecting against potentially malicious parties inside the organization is challenging, so a variety of steps are necessary, beginning with pre-employment HR background checks. The organization may also find it necessary to conduct periodic and ongoing background checks where applicable, on key roles that have access to critical financial data or intellectual property. In addition, segregation of duties, along with other administrative controls must be employed for critical business processes to reduce the risk of a single party being responsible for theft and/or deliberate or accidental loss of data.
  4. Train your team to be a viable front line of defense. Employ a variety of training initiatives to supplement web-based training, such as phishing simulations or other interactive exercises (contests, quizzes, etc.). While training courses encourage vigilance and promote adherence, simulations allow employees to practice identifying and reporting threats, and therefore, improve over time.
  5. Create a security-minded corporate culture. Data is the lifeblood of your organization, and employees must fully understand their roles and responsibilities in protecting it. A data breach may not only impact day-to-day business, but it could potentially impact their job security. Therefore, accompany training with “tone at the top” messaging from leadership explaining why these efforts are important and how their actions make a difference.
  6. Evaluate and update your document protection policies. Institute policies that require employees to understand how to properly handle and retain documents and records. Clean desk, document destruction services, and remote work policies will take the guesswork out of secure document handling and help to reduce the risk of human error. Consistently reinforce the consequences and steps to take when violations occur.
  7. Consider investing in cyber insurance. These services can help cover the cost of legal services and advice, as well as crisis management services.

Do You Have the Right Team?
Many businesses realize that they cannot do it alone. Three-quarters of business leaders in the US have hired a third-party security expert to evaluate security practices. To help ensure you have visibility to the rapidly changing threat landscape and the strategies available to combat it, consider partnering with an expert service provider to help you bridge gaps.

About the Author

Michael V. Borromeo has over 20 years of broad and diversified experience in the fields of Privacy and Cybersecurity. He has designed Privacy strategies and implemented compliance programs, which include creating and/or enhancing IT and business processes, developing policies and standards, and employing technology solutions. Michael has a depth of knowledge and skill in the areas of information governance, policy and regulatory compliance, information security strategy and architecture, and IT security risk management.

Featured

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.