Page not available in your preferred language
The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Boxes and filing cabinets stuffed with old documents? Get our one-time document destruction service.
Protect your business from an information breach with regularly scheduled paper shredding service.
Our convenient, easy to use, drop off document shredding is just around the corner.
Ensure sensitive data on old hard drives is 100% inaccessible by physically destroying the drive.
Private information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
From pill bottles to identity cards, specialty shredding destroys information wherever it’s found.
Get a Quote
Back To Information Security Resources
In this issue, we will discuss how effectively U.S. businesses are protecting confidential information and what businesses of all sizes can do to improve their security practices and protocols.
When it comes to information security, businesses may not be doing as well as they think in protecting their and their clients’ confidential information. Earlier this year, Shred-it commissioned a survey called the Information Security Tracker to find out if American businesses are doing enough to protect their own confidential information as well as the their client’s information. The survey asked large and small businesses to share their attitudes, protocols and practices towards information security. The results of the survey demonstrated that there are businesses of all sizes that are not making information security a priority. The question is: who is doing more to protect client and business data – large or small businesses? Or, is business size not a factor in proper information security procedures? In order to gain an understanding of who is more on top of document security, we will look at how big and small businesses responded to relevant questions from the 2012 Information Security Tracker.
Download PDF Version
When asked if they were aware of the legal requirements of storing, keeping or disposing of confidential data in their industry, 95 percent of large businesses admitted to being at least somewhat aware of the requirements, while only 77 percent of small businesses could say the same. This brings a question to mind – if a business is not at least somewhat aware of what is legally required of them, how can they ensure they are taking the proper precautions?
While it’s essential that businesses know what is compulsory from a legal perspective, an information security policy is not effective unless it is shared with all staff. The survey asked respondents if their company had a known and understood protocol for storing and disposing of confidential data. Again, large businesses demonstrated that they understand the significance of awareness as it relates to information security – 92 percent said they had a protocol, while only 58 percent of small businesses said they had a protocol in place.
For employees working at any given company, having knowledge of their organization’s data security policies is vital. At the same time, it’s possible that an employee may be trained on these procedures when hired but then never given subsequent training. The Information Security Tracker sought to find out more about how often companies are training employees on relevant security procedures. Only 27 percent of large businesses and ten percent of small businesses train their staff twice a year, while a fair number train on an annual basis (41 percent of large businesses compared to 13 percent of small businesses). Many companies opt to only train on an ad hoc or as-needed basis (22 percent of large businesses compared to 42 percent of small businesses); however, 8 percent of both large and small businesses provide training only once during their staff’s employment.
One step that can help an organization ensure that these policies are communicated to staff is to appoint an employee to be directly responsible for managing data security issues. Most large businesses surveyed (96 percent) have an individual filling this role, while just over half of small businesses (54 percent) have designated an employee to fill this position.
Data breaches have the potential to cause serious implications for businesses of any size, including a loss of money, reputation, clients and more. In an effort to learn more about how seriously businesses consider breaches, the survey asked: in the event that data from your company was lost or stolen, how would this impact your business? Large businesses seemed to understand the complications that could arise as a result of a breach, as only 20 percent of large businesses indicated a data breach would not seriously affect their business. Small businesses were less likely to recognize the severity of a breach with 51 percent answering the same.
As technology continues to advance, organizations need to be aware that there are increasingly more items containing sensitive data. In the survey, businesses were asked how they dispose of aging or obsolete computers (or other data-storing electronics such as smartphones or photocopiers) that are no longer used. A relatively equal number of large and small businesses answered that they simply recycle these items (12 percent of large businesses compared to 18 percent of small businesses) along with erasing, wiping or degaussing contents then recycling (67 percent of large businesses compared to 52 percent of small businesses). With both of these methods, sensitive information could potentially be retrieved – the best way to ensure data is not recovered is to have the hardware fully destroyed– something that only 17 percent of both of large businesses small businesses are doing.
Data breaches may seem like they are not a source of concern for businesses that have not been affected by one. However, the survey asked businesses if they would pay greater attention to safeguarding data if Congress were to introduce stricter data protection laws that would require stricter compliance. In response, large businesses were more likely to answer yes (55 percent), though less than a quarter of small businesses had the same response (22 percent).
The Information Security Tracker revealed that large businesses overall seem to be more on top of their procedures; however, it also showed that there are organizations of all sizes that have gaps in their policies and there are areas for improvement. It is crucial to be vigilant when seeking ways to safeguard data. In order to strengthen their data security measures, businesses should consider the following tips:
Consider holding regular training sessions for all employees on proper information security procedures
Appoint an individual or committee responsible for managing data security procedures
Conduct an annual information security audit and risk assessment to identify potential sources of data loss
Establish a shred-all policy that is communicated to all employees
Ensure that all pieces of obsolete technology are fully destroyed or crushed so that information cannot be recovered
To learn more about Shred-it services or to book your FREE security assessment. Visit www.shredit.com.
You can also visit Shred-it on Facebook and LinkedIn or follow us on Twitter at @Shredit.
Fill out the form below and we’ll contact you with a free quote within the hour! (Between 8:00am and 5:00pm, Mon - Fri)