Data privacy in the digital age: Why you need employee social media guidelines

Data privacy in the digital age: Why you need employee social media guidelines

Gini was excited to start her new role as sales executive at a small yet growing IT startup. She was thrilled when one of her sales leads responded positively and accepted her invite for a face-to-face meeting.

She posted on her social media page:

“So glad to get a lead moving up the pipeline. Hope to convert Fraser & Co in Monday’s meeting!”

Do you think Gini closed the deal?

Nope. In fact, she lost her job.

But, why?

Gini had shared confidential client and sales information on a public domain. Friends and competitors browsing her posts pounced on the lead and closed the deal for themselves before she could. The IT firm fired Gini for violating its data privacy rules and ruining a good sales opportunity.


(more…)

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

Investing in data and information security ranks number three for small and midsize businesses that are prioritizing their tech budgets for 2019, according to a recent survey.

But, purchasing and installing security software is only half the job. You must also maintain the software—through regular updates, deployment on new endpoints, and customized configurations—to ensure that it meets your specific business needs and is able to deliver on protecting your business against cyberattack attempts.

Symantec Endpoint Protection is one among the many security software solutions on the market from which small businesses can gain more value if implemented and used correctly. Optimizing the use of all Symantec Endpoint Protection features will ensure maximum return on your investment (ROI).

(more…)

CCPA, GDPR, and the state of internet privacy laws

CCPA, GDPR, and the state of internet privacy laws

2018 was a breakthrough year for internet privacy laws. In May, the European Union’s General Data Protection Regulation (GDPR) went into full effect, sending the digital business world scrambling to get in compliance.

Then, during the summer, the United States got in on the action with the adoption of the California Consumer Protection Act (CCPA), an effort that will make a huge impact one year from now. And we still haven’t talked about the EU-U.S. Privacy Shield, ePrivacy, or the CLOUD Act.

Despite the headlines, a recent GetApp data privacy survey of small businesses found that a whopping 65 percent of respondents felt their company was only somewhat prepared or simply not prepared to comply with data privacy regulations.

(more…)

Data archiving vs. backup: Which does your small business need?

Data archiving vs. backup: Which does your small business need?

Small businesses owners often confuse data archiving with data backup (and vice versa) and end up purchasing the wrong software tools. But the truth is: Data archiving and data backup serve two different and clearly distinct purposes.

Why archive: Regulations such as MiFID II and Sarbanes-Oxley require you to store information for five to seven years. Archiving software helps store data for these long periods at lower costs compared to other file storage or data backup tools. Archiving tools help to clear up your storage space and move older data to a different storage system.

(more…)

It’s never too early to invest in small business security—just ask my 4-year-old

It’s never too early to invest in small business security—just ask my 4-year-old

In our always ticking digital economy, kids grow up fast. Just this weekend—embarking down the same path as many entrepreneurial greats before her—my 4-year-old opened her very own lemonade stand.

And it’s with a heavy heart and the love only a father can have for his daughter that I must say: Darling, your business is in trouble. I have no choice but to give it a one-star review.

Just know it’s not your fault, and I can blame only myself. Let me try to explain.

When life gives you lemons, you buy security software … wait, what?

(more…)