Preventing Identity Theft In Your Business

Judith M Collins



Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.

What will you learn from this book

  1. Employee Training:

    • Train employees on security awareness, including recognizing phishing attempts, using strong passwords, and safeguarding sensitive information.
  2. Secure Data Storage:

    • Use secure methods to store and transmit sensitive data. Employ encryption and secure servers to protect customer and employee information.
  3. Access Controls:

    • Implement strict access controls to limit who can access sensitive data. Only grant access to employees who require it for their specific roles.
  4. Regular Security Audits:

    • Conduct regular security audits to identify vulnerabilities and address them promptly. This includes reviewing access logs and monitoring for unusual activities.
  5. Data Backups:

    • Regularly back up important business data. In case of a security breach, having up-to-date backups can help in the recovery process.
  6. Shredding and Disposal Policies:

    • Implement proper document shredding and disposal policies to prevent unauthorized access to physical records containing sensitive information.
  7. Secure Wi-Fi Networks:

    • Secure your business's Wi-Fi network with strong passwords and encryption. Regularly update router firmware to patch security vulnerabilities.
  8. Use Trusted Software:

    • Ensure that the software used in your business is legitimate and regularly updated. Patch software vulnerabilities promptly to reduce the risk of exploitation.
  9. Customer Education:

    • Educate customers on how to recognize legitimate communication from your business. Warn them about potential phishing scams and advise them on protecting their personal information.
  10. Incident Response Plan:

    • Develop and implement an incident response plan in case of a data breach. This plan should outline the steps to take when a security incident occurs.
Language English
ISBN-10 0-471-69469-X
ISBN-13 9780471694694
No of pages 245
Font Size Medium
Book Publisher Wiley
Published Date 01 Jul 2005

About Author

Author : Judith M Collins

2 Books

Related Books