Free Site Registration

5 Devices That Are Endangering Your Business

With data breaches estimated to cost an average of $5.4 million per incident, businesses need to be aware of five office tools that are particularly vulnerable, according to experts.

After a recent study by the Ponemon Institute revealed the high cost of data breaches, the privacy and information security policy research center teamed with document management company Cintas Corp. to identify overlooked areas of risk for data security.

“With the growing number of digital devices in today’s businesses, it is no longer sufficient to only secure data stored on documents or in computer files,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “Data stored on digital devices such as fax machines and routers must be securely destroyed to prevent it from getting into the wrong hands.”

The most commonly overlooked digital devices that could create the risk of a security breach are:

1. Old hard drives. Many discarded or unaccounted for hard drives contain confidential and recoverable information. Complete physical destruction is the best way to protect this sensitive data.

2. Copy machines. The latest generation of digital copiers have a hard disk that can often include sensitive information such as Social Security numbers and account numbers. Some devices include a security feature that allows you to overwrite the hard drive, which should be done at least once a month.

3. Fax machines. A fax machine sitting out in the open not only makes it easy for employees to access, but also allows wandering eyes to notice the data as they walk by. Create a corporate faxing policy that forbids employees from leaving documents unattended at the fax machine. Fax machines also contain hard drives that store data from each document they transmit.

4. Routers. Whether you use a wired or wireless router, if it is not configured properly, it could pose potential security risks. Pirates using your Internet connection can not only slow down your connection, they can also gain access to your confidential information.

5. Mobile devices. Businesses must put “Bring Your Own Device” or BYOD and mobile device policies in place to protect against the potential risk of a stolen or missing mobile device. An effective policy should include training programs, and heightened security measures such as remote wipe.


Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Accounting Today, please use the form below to login. When completed you will immeditely be directed to post a comment.



Accounting Technology


The Virtual Firm

November 7, 2013

Jennifer Katrulya, CEO of the Business Management Resource Group, discusses how to run an accounting practice from an iPad or other mobile device in a virtual environment, in an interview with managing editor Tamika Cody at Accounting Today's Growth & Profitability Summit in Orlando.

Social Media Tips for Professional Services Firms

October 9, 2013

Social media strategist Adrian Dayton and BeachFleischman PC chief marketing officer Eric Majchrzak discuss how accounting firms and other professional services firms can use LinkedIn, Google+ and other social networks to market their offerings to potential clients, and use search engine optimization to showcase their content, in an interview with Accounting Today senior editor Danielle Lee.

Top 10 Tech Trends for 2014

March 3, 2014

As companies gain more affordable access to new technology and platforms, they also seek to make smarter investments. As we begin 2014, James Cashin, partner at McGladrey, has identified ten common strategies in how companies are capitalizing on their IT investments to best implement process improvements and increase performance.