Five Takeaways from “Confidential Conversations: Are They Actually Possible?”
Last week, our CEO Galina Datskovsky and global security expert Paul Viollis hosted a panel titled “Confidential Conversations: Are They Actually Possible in Our Technological Age?”. We were lucky to be joined by a diverse group of journalists, industry experts, and other people in enterprise to discuss how to use communications to improve security, privacy and employee safety. The panel covered a lot of ground—from discussions about human risks to company security to conversations about how to develop legal and business strategies to protect businesses. Here are five of our key takeaways from the conversations that day.
1. People don’t break into your house anymore; they break into your life.
These days, it isn’t your cash or your jewels that are the most valuable thing you own, it’s your data. When people steal your data, they’re breaking into your life. They can impersonate your identity, access your bank information, and share sensitive information. We all need to recognize this and prepare to protect our data.
2. Be aware of who has access to your business’s information.
A business’s reputation can be ruined by the people you let into the business—and sometimes that’s not even people you’re thinking about. The people you hire have access to your business’s information and so can the subcontractors they hire. Knowing who has access to what information can quickly get complicated, which is why it’s important to remain alert.
3. Know where you stand with your vulnerabilities—and make sure you’re communicating securely about them.
Companies are responsible for their security practices—and that includes doing regular assessments to evaluate where you stand on security and to protect yourself better. Securely communicating is key to this: when you’re assessing vulnerabilities it’s critical that malicious third parties can’t find out about these vulnerabilities. Vulnerability reports should only be transmitted over secure communications and never over something insecure, like email.
4. Cyber Insurance is a good thing to have because breaches happen.
Breaches happen—and hackers can be embedded in your system for months before you find out. Cyber Insurance isn’t going to cover that if you only purchase it after you discover the breach. Best practice is to have cyber insurance in general while maintaining a good security posture.
5. Notify outside counsel if you discover a breach.
If you discover a breach, you should notify outside counsel to establish privilege while communicating about sensitive issues. When you engage with your attorney, make sure you’re using best practices, communicating securely and privately and outside of your main communications system, which may be compromised.
Vaporstream works closely with businesses to protect their communications and make sure they’re prepared if a breach happens. Learn how what make us the secure choice here.
Contributor: The Vaporstream Team