Table of Contents Table of Contents
Previous Page  133 / 284 Next Page
Information
Show Menu
Previous Page 133 / 284 Next Page
Page Background

HOT TOPICS

2017

MEMBERSHIP

DIRECTORY

118

computers to store or access customer data to use protections against viruses, spyware, and other

unauthorized intrusions.

Imposing disciplinary measures for security policy violations including termination of employment.

Preventing terminated employees from accessing customer information by immediately deactivating their

passwords and user names and taking other appropriate measures.

Information Systems

Information systems include network and software design, and information processing, storage, transmission,

retrieval, and disposal. Replace systems such as Windows versions XP or earlier that are no longer supported and

make sure your antivirus, anti-malware, firewall, and other security software is up to date at all times. Here are

some suggestions on maintaining security throughout the life cycle of customer information, from data entry to

data disposal:

Know where sensitive customer information is stored and store it securely. Know its life cycle throughout your

organization. Make sure only authorized employees have access. For example:

Ensure that storage areas are protected against destruction or damage from physical hazards, like fire or

floods.

Store physical records in a room or cabinet that is locked when unattended.

When customer information is stored on a server or other computer, ensure that the computer is accessible

only with a “strong”password and is kept in a physically-secure area.

Place customer information on a separate secure server or in a secure cloud-based server. Limit permissions

and require additional access requirements (two-factor authentication) such as a randomly-generated token

number and additional password to be able to access the server.

Where possible, avoid storing sensitive customer data on a computer with an Internet connection. It is a good

practice to provide “read only”access to customer information and disable the ability to download customer

information onto third-party devices (USBs, external hard drives, etc.).

Maintain secure backup records and keep archived data secure by storing it off-line and in a physically-secure

area.

Maintain a careful inventory of your company’s computers, servers, and any other equipment on which

customer information may be stored.

Monitor employees accessing customer information in both paper and electronic format. You should review

the monitoring regularly to detect any unusual spikes in activity and quickly find out the reason.

Get a static IP address from your Internet Service Provider. This will keep your IP address from changing and

enable sites like Dealertrack to only accept requests for customer information from your trusted IP address.

This can be a major protection in the event employees’user names and passwords are compromised.

Use a cloud-based proxy server or a software-based proxy server to prevent users from going to sites that are

associated with viruses, malware, or that are otherwise insecure.