Leveraging Technology to Mitigate Risk Part #1: Be Proactive, Not Reactive

July 16, 2018

Part 1 of our blog series focuses on being proactive when it comes to your organization's data security. Technology provides a powerful platform allowing organizations to innovate at a rapid rate. 

ProactiveNotReactiveTechnology is so entrenched in our work-lives, we take for granted how things like email services, smart phones, video chatting, and computers have revolutionized the business world. However, with technology progressing and changing so quickly, it has also made organizations vulnerable to risks like cyber-attacks and data breaches, putting their clients’ privacy in jeopardy. Over the next few weeks, our blog will cover some of the top ways you and your organization can protect yourselves from the increased risk associated with the daily use of technology. 

Be Proactive, Not Reactive

Mitigating technology risk requires organizations to continually remain one step ahead of hackers. Russel Stalters, CEO of Clear Path Solutions Inc. and author of gettinginformationdone.com, firmly believes that senior executives and business leaders should adopt a “when we get hacked” mindset—not “if we get hacked.” This mentality forces organization leaders to acknowledge their security is always at risk, and hackers are waiting to take advantage of one slip up. In 2018 alone, companies like Panera Bread, Delta, and Under Armour, have experienced data breaches in which customers’ personal and payment information was accessed and leaked. And these slip-ups aren’t cheap, either. In 2013, Target experienced a massive credit card breach that affected over 41 million customers. Target was forced to pay out $18.5 million to customers across 47 states and Washington, DC. If you don’t implement proactive policies and continually renew and improve them, your organization is putting its clients at a serious risk—a mistake that can cost you millions.

Some best practices to help your organization stay ahead of the hackers is to put data disposition and cyber security policies in place before they are needed. Ensure that all employees not only understand the policies, but also understand why these policies are being used in the first place. Make sure your organization also has a person or a committee in place to enforce these policies—these protocols don’t do your organization any good if no one follows them. Continually assess your policies so they remain up-to-date with the latest technology, industry regulations, and trends.