8 Mostly Free Best Practices for Tightening Internal Data Security Cybersecurity is a constant worry, but a few commonsense steps protect the company without hurting the bottom line.

By Larry Alton

Opinions expressed by Entrepreneur contributors are their own.

Just how safe is your company data? According to the IBM Cyber Security Intelligence Index, U.S. businesses experienced over 1.5 million monitored cyber attacks in 2013 alone. Sensitive information regarding your internal operations, your customers and your employees is at risk if your organization does not take proper measures to secure its data. Take a look at these eight crucial security reminders for business leaders to keep in mind.

1. Password Character Requirements. There's a reason why so many web-based consumer services require complex passwords. Unauthorized users are less likely to guess passwords when employees use a blend of phrases, upper and lower case letters, numbers, and punctuation. Work with your IT department to configure the password requirements for your employees.

2. Password rotation. Passwords that go stagnant are a liability for companies. For example, former employees might still be able to gain access to confidential information after they leave the company, if teams use the same outdated group email. Schedule password rotations every few months so that every user must update accounts with new passwords.

3. Session time out. This setting prevents a user's account from remaining signed into a system after a certain period of time. For example, if a cashier leaves their point of sale terminal, their session should automatically expire after a delay so that no unauthorized users can attempt to operate the point of sale.

4. No outside hardware. No employee should be allowed to use external hardware in the office, such as storage devices or other peripherals, unless cleared by your company's IT department. External devices can contain spyware or viruses that pose a significant risk to your computers and network. Additionally, this restriction reduces the risk of employees stealing internal data.

5. Installation restrictions. Employees should not be able to install unauthorized software on work computers or mobile devices, since unchecked installations can lead to malware infections. For example, a graphic designer might decide to download a freeware utility to complete a project. While they are well intentioned, this employee might accidentally install a trojan on their work computer.

6. Managed mobile devices. Mobile device management (MDM) software allows you to enroll in-house and BYOD technology in a system that deploys security configuration settings, company data and content over the air. This is an excellent way to enforce remote security restrictions, such as password updates or app restrictions. Once an employee leaves a company, company-related data can be quickly wiped from their device remotely.

7. Backup encryption. Copies of your company data can also be a weak point, if unauthorized users are able to view and edit these files. Work with your IT department to create redundant and encrypted backups of your business-critical data.

8. Remote wipe. Mobile device solutions like Android Device Manager and iCloud allow you to remotely wipe device data if your smartphone or tablet is lost or stolen. This will quell your fears about confidential data leaks, in case you forget your phone at a restaurant. Many of these remote security systems also help you track and lock your devices, so that you can attempt to recover your technology before erasing it.

Anyone from the newest intern to C-level executives can become a target of digital crime. Train your employees to observe data security best practices. Taking proactive measures will help your business stay ahead of threats.

Wavy Line
Larry Alton

Freelance Writer & Former Entrepreneur

Larry Alton is an independent business consultant specializing in social media trends, business, and entrepreneurship. Follow him on Twitter and LinkedIn.

Editor's Pick

'Catastrophic': Here's What You Should Know About the Debt Ceiling Crisis — And How a Default Could Impact Your Business
Lock
I Helped Grow 4 Unicorns Over 10 Years That Generated $18 Billion in Online Revenues. Here's What I've Learned.
Lock
Want to Break Bad Habits and Supercharge Your Business? Use This Technique.
Lock
Don't Have Any Clients But Need Customer Testimonials? Follow These 3 Tricks To Boost Your Rep.
Why Are Some Wines More Expensive Than Others? A Top Winemaker Gives a Full-Bodied Explanation.

Related Topics

Business News

7 of the 10 Most Expensive Cities to Live in the U.S. Are in One State

A new report by U.S. News found that San Diego is the most expensive city to live in for 2023-2024, followed by Los Angeles. New York City didn't even rank in the top 10.

Business News

'All Hell Is Going to Break Loose': Barbara Corcoran Issues Warning About Real Estate Market, Interest Rates

The "Shark Tank" star appeared on FOX Business' "The Clayman Countdown" this week.

Money & Finance

3 Ways to Create Multiple (Big) Streams of Income

Here are three ways to create multiple streams of income. These strategies require effort and resources but offer significant financial potential.

Science & Technology

She's Been Coding Since Age 7 and Presented Her Life-Saving App to Tim Cook Last Year. Now 17, She's on Track to Solve Even Bigger Problems.

Angelina Tsuboi, a full-stack mobile and web developer who also happens to be a pilot, has always been solution-oriented.

Science & Technology

Why We Must Reimagine Education in the Age of Technology

Here's why we must reassess our traditional notions of education in the digital age.

Growing a Business

A Guide to Visualizing Data in Your Pitch Deck

What separates your pitch deck from the 99% that go in the trash? Learn how to use data visualization to create compelling investment decks that secure investments to get your business off the runway.