Data Destruction Policy
Media Sanitization Policy
Social Media Policy
Website Analytics: Web analytics are a way to collect information about websites to see patterns and trends. Analytics can be used to track traffic counts, viewer participation, advertisement effectiveness, and more. Analytics are a great tool for any web master!
Paper Shredder: A simple way to protect yourself and your organization is to shred your documents when they are no longer needed. Dumpster divers can be easily defeated by implementing shredding policies in your organization. Never toss out your sensitive documents without shredding them first!
Privacy Screens: These little device accessories can be affixed to phones and computer monitors to prevent shoulder surfers from seeing the screen. From the normal viewing angle, the screen will look normal, but to people at odd viewing angle, it will look like you’re tapping away on a black screen!
Data Destruction Policy: Data accumulates over time, and hard drives fill up with sensitive and private information. When hard drives are removed or replaced, you need to make sure they aren’t simply thrown away. Companies such as Google will often dispose of their old hard drives by feeding them through an industrial shredder!
Honey pot: An ingenious way to frustrate attackers and protect yourself is to implement honey pots. Honey pots are bait devices for hackers. A honey pot is made to look like an actual company computer or device, and can be filled with fake or misleading data. When attackers try to scan or hack the device, all their actions are being watched and logged!
Hackers and bots fall for it all the time!
Media Sanitization Policy: When a data storage device, such as a computer hard drive, is repurposed or reused, the data on that drive may be still exist and be accessible. When files are deleted in Windows, for example, those files aren’t really being deleted. In order to wipe a drive completely, special procedures and tools have to be used. An IT-savvy company will have a policy on how to sanitize drives before they are reused. Some companies, such as Google, will even dispose of their hard drives by feeding them into a industrial metal shredder!
Social Media Policy: Social media is one of the best ways for sensitive secrets to get leaked. Set organizational policies so that employees don’t accidentally compromise the company by publishing company secrets or taking selfies in the server room!
CCTV: Video surveillance has been around for years, and the technology continues to improve. Modern security cameras can have powerful digital features, such as automatic face recognition that scans in live-time and feeds the data to and from a database!