{"id":449,"date":"2016-04-06T13:00:55","date_gmt":"2016-04-06T13:00:55","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=449"},"modified":"2018-07-04T07:59:12","modified_gmt":"2018-07-04T07:59:12","slug":"10-steps-to-prevent-data-breach-regarding-cyber-security","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/10-steps-to-prevent-data-breach-regarding-cyber-security\/","title":{"rendered":"10 Steps To Prevent Data Breach regarding Cyber Security"},"content":{"rendered":"<p><a href=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/02\/LOGOsIs1.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-328\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/02\/LOGOsIs1.png\" alt=\"Security In Shredding logo\" width=\"310\" height=\"382\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/02\/LOGOsIs1.png 310w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/02\/LOGOsIs1-243x300.png 243w\" sizes=\"(max-width: 310px) 100vw, 310px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.securityinshredding.com\/\"><strong>Paper Shredding Services<\/strong><\/a> are an important part of business practice. A reputable <strong>onsite shredding service<\/strong> can be incorporated for business <strong>Data Protection.<\/strong><\/p>\n<p>Cyber <strong>Security<\/strong> comes in many forms and one method which is targeted regularly are credit cards. Criminals will try anything into tricking people to obtain credit card numbers. There are a number of preventative methods you can use to protect your details. Below is a list of steps to look out for to improve your <strong>data security<\/strong>:<\/p>\n<ol>\n<li>Don\u2019t be tricked into giving away confidential information; \u00a0make sure you do not respond to emails or phone calls requesting confidential information. Report any suspicious activity to IT and\/or your manager.<\/li>\n<li>Don\u2019t use an unprotected computer; ensure to use a computer that has latest approved security software prior to viewing and company information (particularly if you are viewing the material from an internet caf\u00e9 or shared computer)<\/li>\n<li>Don\u2019t leave sensitive information on your desk; Keep them safe by locking them in a drawer or have them destroyed \u2013 shredded securely using a registered Data Processor.<\/li>\n<li>Lock your computer and mobile phone when not in use; Keeps your data and contacts safe from prying eyes.<\/li>\n<li>Stay Alert and report suspicious activity; In case something goes wrong and the sooner you report the issue the faster it can be dealt with.<\/li>\n<li>Password-protect sensitive files and devices; Protecting your devices with strong passwords means you make it incredibly difficult to break in and steal data.<\/li>\n<li>Always use hard-to-guess passwords;\u00a0Make sure to use complex passwords not just 12345 or abcdef but \u201cG$4s1KoOl\u201d for example. (It is used more often than you think.)<\/li>\n<li>Be cautious of suspicious emails and links; don\u2019t let curiosity get the best of you. If it sounds too good to be true it probably is.<\/li>\n<li>Don\u2019t plug in personal devices without the OK from IT; Personal devices can be compromised with code waiting to launch as soon as you plug them into the computer.<\/li>\n<li>Don\u2019t install unauthorised programs on your work computer; If you like an application and think it would be useful, contact IT to look into it for you before installing.<\/li>\n<\/ol>\n<p>By following the Do\u2019s and Don\u2019ts mentioned above you will greatly reduce the risk of a cyber attack.<\/p>\n<p>Security in shredding offers this type of security and more. please visit our website for more information: <a href=\"https:\/\/www.securityinshredding.com\/\">https:\/\/www.securityinshredding.com\/\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paper Shredding Services are an important part of business practice. A reputable onsite shredding service can be incorporated for business Data Protection. Cyber Security comes in many forms and one method which is targeted regularly are credit cards. Criminals will &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/10-steps-to-prevent-data-breach-regarding-cyber-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,6,32],"tags":[58,28,23,36],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/449"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=449"}],"version-history":[{"count":7,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions"}],"predecessor-version":[{"id":1327,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/449\/revisions\/1327"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}