5 Ways to Help Protect Your Company's Data

Travelers umbrella logo.
By Travelers Risk Control
4 minutes
Digital icons representing data protection.

data breach could turn into a catastrophic event for any company, especially for small businesses that may not be prepared for this emerging threat. The 2015 Symantec Internet Security Threat Report found that 60% of all targeted attacks struck small- to mid-sized companies.1 As a business owner or an employee, there are a number of preventive steps you can take to help keep your company’s data secure. The most important place to start is to know the common causes of data breaches and how to avoid them before the damage is done.

You may think data breaches are mainly caused by outsiders hacking into the system. While that scenario is the one that makes headlines in the media, the fact is that employee error, such as a lost or stolen computer or mobile device, or downloading malicious software, can also lead to data loss or a data breach incident. Train your employees to better understand these risks to help protect your company’s data.

Following are some safety steps, including how to help protect your work space, stay safer when receiving email and create strong passwords.

1. Protect Data at Your Work Space

If you step away from your desk while you are in the middle of a project that includes sensitive business information, take some precautions to protect company data from visitors or others who are not authorized to see that information. Remember these simple tips for keeping your work spaces secure:

  • When you step away from your computer, lock it up. You can also change your preferences to require your user account password when unlocking or waking up your computer.
  • After a meeting, clean up your materials.
  • After printing, copying or faxing, pick up your documents right away.
  • Keep sensitive documents in secure locations.
  • Always stay aware of your surroundings.

2. Be Aware of Phishing Schemes

Phishing emails are fake email messages that can be used by criminals and hackers to target your credit and identity, gain control of your computer and network or steal your password and access company information. They often appear as if coming from a trusted source, such as your credit card company or another vendor, and can often include links or attachments that they ask you to download. You should delete suspicious emails without opening them.

Before you open an email or respond to any requests to download files or click on links, confirm that it:

  • Comes from someone you know.
  • Comes from someone who has sent you an email before.
  • Is something you were expecting.
  • Does not look odd, with unusual spelling or characters.

3. Passwords: Longer is Stronger

Using strong passwords and changing them regularly makes it harder for thieves to access information. Never share your password with anyone. Choose something cryptic so it is difficult to guess, but it should also be memorable so you can avoid writing it down. If you do write it down, keep it in a locked cabinet or drawer.

Best practices for strong passwords include the following:

  • Passwords should not contain all or part of your name or ID.
  • Passwords should be at least seven characters long.
  • Passwords should contain characters from at least two of the following four categories: upper case letters, lower case letters, numbers and symbols (e.g., &, %, $, #).

4. Stay On Guard While Traveling

Portable devices, including laptops, tablets and smartphones, can be easier to lose and a target for thieves. Be aware when logging in to secure systems in public places so others cannot see your username and password.

  • Keep your mobile device with you at all times while at the airport, on public transportation or in any public space, and never check it with your baggage.
  • When you travel by car with your laptop, put it in the trunk of the vehicle. Take it with you when you arrive at your final destination.
  • Never store your password or backups with your mobile devices.
  • When away from the office, keep your company laptop, mobile device and portable storage devices, such as flash drives, secure, either locked up or in your personal possession.

5. Recognize Social Engineering

Much like piecing together a puzzle, social engineers get what they need by gathering pieces of information from many different sources, including your social profiles and other information about your organization. Since people may not be who they claim to be, always verify before providing any kind of information.

If someone you do not know claims to be a fellow employee, you can:

  • Try calling the person back at their work phone number.
  • Send a code word or number to his or her company email address and ask the person to call back with it.

Share these tips with others in your organization to help keep your company’s data safe. Learn more about cyber risks and how to create cyber security training for employees.

Person checking laptop software for cyber crime threats.

Top Stories

Is Your Software Supply Chain at Risk of Cybercrime?

There are a handful of methods by which cybercriminals are conducting software update supply chain attacks. Here are the common attack methods noted by HCL Technologies.

Related Products & Services

We understand the complexity of cyber threats and have cyber liability insurance solutions to help protect your business assets.

Provides organizations of all sizes coverage to help protect against losses resulting from data breaches and other fast-evolving cyber exposures.

More Prepare & Prevent

9 Key Elements of a Data Security Policy

A data security policy helps protect your data from cyber breaches. Help keep your company's data secure by following these essential elements of a data security policy.

Person typing on computer.

More Prepare & Prevent

Crisis Communications Planning for a Data Breach

Cyber crisis communication planning can help prepare your business for unexpected data breaches. Learn about crisis communication planning with Travelers.

Business leaders discussing crisis communication plan around a table.

More Prepare & Prevent

How Does Cyber Insurance Work?

What is cyber insurance coverage and how does it work? Get the answers and learn about the different types of cyber insurance coverage with Travelers.

Graphic of secure cybersecurity practices.