5 Ways to Help Protect Your Company's Data

Travelers T logo
By Travelers
3 minutes
Last updated 1 March 2022
Login Box - Username and Password in Internet Browser on Computer Screen.

A data breach could turn into a catastrophic event for any company. As a business owner or an employee, there are a number of preventive steps you can take to help keep your company’s data secure. The most important place to start is to know the common causes of data breaches and how to avoid them before the damage is done.

You may think data breaches are mainly caused by outsiders hacking into the system. While that scenario is the one that makes headlines in the media, the fact is that employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can also lead to data loss or a data breach incident. Train your employees to better understand these risks to help protect your company’s data.

Following are some safety steps, including how to help protect your work space, stay safer when receiving email and create strong passwords.

1. Protect data at your work space

If you step away from your desk while you are in the middle of a project that includes sensitive business information, take some precautions to protect company data from visitors or others who are not authorised to see that information. Remember these simple tips for keeping your work spaces secure:

  • When you step away from your computer, lock it up. You can also change your preferences to require your user account password when unlocking or waking up your computer.
  • After a meeting, clean up your materials.
  • After printing, copying or faxing, pick up your documents right away.
  • Keep sensitive documents in secure locations.
  • Always stay aware of your surroundings.

2. Be aware of phishing schemes

Phishing emails are fake email messages that can be used by criminals and hackers to target your credit and identity, gain control of your computer and network or steal your password and access company information. They often appear as if coming from a trusted source, such as your credit card company or another vendor, and can often include links or attachments that they ask you to download. You should delete suspicious emails without opening them.

Before you open an email or respond to any requests to download files or click on links, confirm that it:

  • Comes from someone you know.
  • Comes from someone who has sent you an email before.
  • Is something you were expecting.
  • Does not look odd, with unusual spelling or characters.

3. Passwords: Longer is stronger

Using strong passwords and changing them regularly makes it harder for thieves to access information. Never share your password with anyone. Choose something cryptic so it is difficult to guess, but it should also be memorable so you can avoid writing it down. If you do write it down, keep it in a locked cabinet or drawer.

Best practices for strong passwords include the following:

  • Passwords should not contain all or part of your name or ID.
  • Passwords should be at least seven characters long.
  • Passwords should contain characters from at least two of the following four categories: upper case letters, lower case letters, numbers and symbols (e.g., &, %, $, #).

4. Stay on guard while traveling

Portable devices, including laptops, tablets and smartphones, can be easier to lose and a target for thieves. Be aware when logging in to secure systems in public places so others cannot see your username and password.

  • Keep your mobile device with you at all times while at the airport, on public transportation or in any public space, and never check it with your baggage.
  • When you travel by car with your laptop, put it in the trunk of the vehicle. Take it with you when you arrive at your final destination.
  • Never store your password or backups with your mobile devices.
  • When away from the office, keep your company laptop, mobile device and portable storage devices, such as flash drives, secure; either locked up or in your personal possession.

5. Recognise social engineering

Much like piecing together a puzzle, social engineers get what they need by gathering pieces of information from many different sources, including your social profiles and other information about your organisation. Since people may not be who they claim to be, always verify before providing any kind of information.

If someone you do not know claims to be a fellow employee, you can:

  • Try calling the person back at their work phone number.
  • Send a code word or number to his or her company email address and ask the person to call back with it.

Share these tips with others in your organisation to help keep your company’s data safe.

be-cyber-confident.jpg

Cyber insurance with Travelers

Travelers can help with cyber insurance solutions for your business.

Let's start the right conversation

 
For business

Find a broker

If you’re looking for covers and have a broker, ask about Travelers products.

If you need a broker, start with the right broker directory.

Find a broker

Need to call us directly? Contact us.

 
For brokers

Ready to chat?

Let’s work together to build the right cover for your client.

Contact us

More insights & expertise

Thinking Beyond Insurance to Manage Evolving Cyber Risks

Travelers prepares to bring new cyber services to the UK and Ireland market following its acquisition of Corvus.

Matt Waller, formerly of Corvus and now head of the combined cyber underwriting team at Travelers Europe, and Chris McMurray, managing director for cyber at Travelers Europe

More insights & expertise

Managing Cyber Threats in a Law Firm’s Supply Chain

If cyber threats to your law firm keep you awake at night, you’re not alone.

A businessman working late in an office.

More insights & expertise

Interview: Travelers Comprehensive Cyber Solutions | Chris McMurray and James Doswell

What are the top cyber threats facing UK businesses right now? This video explores Travelers’ cyber proposition in the UK.

Man holding smart phone with data security on display at office