All the Ways You're Not Protecting Company Data

By Bruce Harmon, Ph.D., Program Director for Computer Science

Data Privacy Day is held annually on Jan. 28 to raise awareness and empower people to protect their privacy and control their digital footprint. Colorado Technical University (CTU) is committed to promoting privacy awareness and has partnered with the National Cyber Security Alliance to help spread the word about this important issue. On this blog, CTU faculty share their insights and tips to keeping your digital identity safe.

CTU Computer Science Degree - Safe DataIn most organizations, the Chief Security Officer (CSO) or Chief Information Security Officer (CISO) is responsible for alerting the Chief Information Officer (CIO) and other key executives of potential security risks related to the business’ critical Information Systems (IS) infrastructure and data. Another key responsibility is to mitigate cyber-attacks.

While the steps to protecting company data and infrastructure are complex and unique to every organization, here are five fundamental actions every company must take:

  1. Strengthen password protocol. Establish company policy on strong password requirements and enforce it. This may mean requiring frequent password changes and setting a minimum character length for passwords.
  2. Encrypt sensitive data. While this might introduce complexity and performance degradation, it is essential to prevent the accidental release of sensitive information that can expose your company and its clients to harm.
  3. Educate staff. All employees, including contractors and vendors, should be apprised of security practices in your company. Internal staff is often the weakest security link in companies. To reduce risk, train employees and periodically test their security knowledge. Make it part of their performance evaluation, keeping documentation of their security knowledge.
  4. Practice and test. Stress test your IS infrastructure with professional penetration testers who can identify potential vulnerabilities. Without testing and live practice scenarios, you may never know the extent of your vulnerability to attack.
  5. Establish a redundant IS infrastructure. Creating a mirror image of your healthy, full-operational infrastructure enables business continuity when an unforeseen event strikes. Be sure the mirror is placed off-site in a location that would not normally be subject to destruction by a common event such as earthquake or hurricane. Maintain synchronization between the sites during operation. Design enough isolation between the systems that a successful cyber-attack on one does not achieve the same result on the other.

This list is just a primer. It is not a complete list of preventative actions to be taken, but offer your important first steps you should act on immediately to protect your vital business intel.

CTU Faculty - Bruce HarmonBruce Harmon, Ph.D., is Program Director for Computer Scienceat Colorado Technical University. He earned a Ph.D. in Electrical Engineering with a minor in Computer Science from the University of Colorado and his M.S. in Aeronautical Engineering from Purdue University. He earned a B.S. in Aeronautical Engineering at the United States Air Force Academy. After nine years in the Air Force, he worked in defense and later at top-tier commercial companies for 17 years both in research and executive leadership positions.

Learn why he’s IN.


CTU - Data Privacy Day Champion


Did you enjoy this post? Receive fresh updates from Dr. Harmon and other CTU faculty directly to your inbox by subscribing to CTU’s blog. Join us!


Image credit: Flickr/mythic_moonlight


Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us

 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×