It’s true, we all have a sensitive side. Especially when we’re talking about data. Believe us when we say, every organization has sensitive data. Whether you operate a manufacturing business, law firm, dental practice, or hair salon, you have confidential information hackers would love to get their hands on.
What exactly is “sensitive” data?
Wikipedia defines the word “sensitive” as “quick to detect or respond to slight changes, signals, or influences.” That might be a great way to describe your life partner or coworker, but probably isn’t exactly what comes to mind when you think about your data. Thankfully it also defines it as “kept secret or with restrictions on disclosure to avoid endangering security.”
Credit card and social security numbers are obvious examples. And every business has some mix of the following:
There’s of course a lot more than that. For some, it is obvious, like a healthcare provider facing HIPAA compliance maintaining medical records and storing personally identifiable information (PII). For others, it may not be so clear. Data can come in all forms, like system designs, business processes, or other intellectual property.
So how do you determine if your data is sensitive?
Simple, try this data-sensitivity spot test: Ask yourself and your team this question, “Is this information something we'd like posted on a website that everyone can look at?” If the answer is No, then it’s safe to consider sensitive and should be protected. Yes, it can be that easy! Let’s give it a try, a couple of basic examples:
Some other examples that you may not have considered:
These are just a few to think about, the list varies with every business depending on industry, size, location, customer types, etc.
Defining what is sensitive in your business and how it is protected is vitally important.
Data is everywhere. It can help to try thinking about it through the key layers of cybersecurity:
When it comes to sensitive data, it’s good to have thick skin—we recommend multiple layers.
Stay Safe,
Your Friends @ Defendify
Subscribe to the Defendify Blog: Cybersecurity in 60 Seconds