Answer:

Cyberattacks on businesses are on the rise and the level of sophistication is ever-changing. While it may be impossible to avoid an attack forever, the risk of having a data security incident can be reduced by following some simple precautionary measures:

  1. Identify your vulnerable points, both internally and externally. For example, hackers and other bad actors may gain access to your data through vendors, employees, and competitors.
  2. Make security part of your organizational culture. Educate your employees about the importance of security measures and encourage them to use strong passwords and to change them regularly, lock hardware, and consider privacy risks when using mobile devices and social media.
  3. Put up a strong firewall and install anti-virus and anti-malware software.
  4. Encrypt your customer data and digital assets.
  5. Run periodic backups.

Finally, before you become the victim of a cyberattack, it is important to have a strong response plan with clearly defined roles, responsibilities and steps to follow to recover data, inform clients, and comply with notification requirements of the applicable jurisdictions. 

Discussion on Data Security

As part of Ohio Attorney General Mike DeWine’s CyberOhio Initiative, David Wilson + Victoria Beckman will discuss common data security issues facing mid-market and small Ohio businesses.

View Our Upcoming Event

Cybersecurity Litigation: Data Protection + Privacy

Jason Beehler presented on a variety of issues relating to data breaches, privacy and cybersecurity.

Learn About the Event

How Safe Is Your Data?

David Wilson joined Capital Crossroads SID’s Information Security + Big Data Forum to discuss the legal implications of how companies collect data, how they can use it, and the consequences of storing, transmitting and analyzing that data.

Learn About the Event

Global Business Attorney Earns Data Privacy Certification

David Wilson holds the title of Certified Information Privacy Manager (CIPM), the first and only certification in privacy program management.

Read More