Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to create an effective data security communication plan

Larry Ponemon | Feb. 5, 2015
In today's global office, IT security leadership spends a great deal of time and resources creating a defense-in-depth approach to data security. This often includes layering on both logical and physical solutions as well as detailing out policies and procedures for accessing company data in a secure manner.

IT security teams must work to create a self-policing organizational culture, where all employees buy into the importance of data security to the overall health and growth of the company. In the previous examples, employees should take confidential conversations into private locations and face screens toward the wall coupled with the use of privacy filters to protect confidential information.

Equip employees with a data security toolkit. Account for both high-tech and low-tech data security threats equipping both BYOD and company-issued devices with a data security toolkit. Take inventory of how and where these devices are being used and roll out security tools using a risk-based approach. Further remove the human factor by creating a process through which new company devices like laptops come pre-installed with data security software, privacy filters and laptop locks. Literature explaining how and why these measures were taken can reinforce security and privacy messaging.

Data security is not one size fits all, nor is a data security communication plan. Finding the ideal fit for any company may take trial and error, but an educated and mindful workforce will serve to support the mission of IT security teams tasked with keeping confidential information just that — confidential.

 

Previous Page  1  2 

Sign up for Computerworld eNewsletters.