storage. scanning. shredding.

Contact Us Today!

What Can Your Tampa Business Learn from 2014?

In 2014, it seemed like there were data breaches occurring everywhere in the U.S. While some people will argue they were simply highlighted more in 2014, when it comes to data breach in the news, this past year covered more occurrences publically than ever before.

The Target breach in 2013 was of substantial size with effects that were extremely widespread; a frightening occurrence that was the result of a POS system hacking. This story revealed that protecting consumer data involves a lot more than simply securing their online presence. All data regardless of how, where, and what is being stored must be done in a manner that ensures customer information is protected.

According to the ITRC, there were 783 data breaches that occurred in 2014; a number we don’t want to see increase in 2015! So what were the causes? The Identity Theft Resource Center started the top four causes of breaches were Hacking (29%), Subcontractor/Third Party (15.1 %), Accidental Exposure (11.5%), and Data in Transit (7.9%).

It’s important to focus on hacking when it comes to preventative measures, but it’s also important not to neglect other forms of theft such as identity theft through dumpster diving techniques. Sensitive information is everywhere, and unless your Tampa business is securely shredding old confidential documents and records, disposing of them in your trash can isn’t enough. In an effort to reduce the number of data breach cases, it’s critical that companies continually educate employees on how to treat sensitive information.  They must also begin to require their business partners to do the same and ask for proof that training did in fact occur.

It is highly recommended that your Tampa business implement a Shred-All Policy in an effort to reduce unauthorized exposure of private documents, and of course human error. It can be difficult for employees to determine whether or not something is deemed confidential; a Shred-All Policy eliminates this confusion, providing a proactive solution that’s easy for everyone to follow.

For more insight on this topic, visit 2014: What we can learn from the year of the data breach

Close