{"id":3122,"date":"2024-05-02T16:07:16","date_gmt":"2024-05-02T21:07:16","guid":{"rendered":"https:\/\/www.connerash.com\/blog\/?p=3122"},"modified":"2024-05-17T16:09:32","modified_gmt":"2024-05-17T21:09:32","slug":"protect-your-security-data","status":"publish","type":"post","link":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/","title":{"rendered":"Protect Your Security Data"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg\" alt=\"\" class=\"wp-image-3123\" style=\"width:382px;height:auto\" srcset=\"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg 1000w, https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data-300x200.jpg 300w, https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data-768x512.jpg 768w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n<\/div>\n\n\n<p>Quite often, data security concerns surface when an employee leaves. But that\u2019s not the only time your data may be at risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HAVE A PLAN<\/h3>\n\n\n\n<p>If you have yet to develop a data protection policy that applies to both new hires and existing employees, do so now. Part of that plan should include specific penalties for those who break the rules. Strive to limit the data employees can access to only what they need to perform their jobs.<\/p>\n\n\n\n<p>On the other hand, avoid having online services and tools with credentials that are available to only one worker.<\/p>\n\n\n\n<p>The plan should provide for quickly shutting off online services if needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">BACK IT UP<\/h3>\n\n\n\n<p>Having a backup strategy in place and routinely backing up data is critical. With your backup strategy, consider services that can track remote systems and render them inoperable if you detect suspicious use.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">REVIEW AND UPDATE CREDENTIALS<\/h3>\n\n\n\n<p>Be aware that even if sharing login\/password information is against company policy, employees could be doing it to save time. Don\u2019t forget contractors and consultants that have access to certain systems. You can\u2019t be too careful with your company\u2019s data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quite often, data security concerns surface when an employee leaves. But that\u2019s not the only time your data may be at risk. HAVE A PLAN If you have yet to develop a data protection policy that applies to both new hires and existing employees, do so now. Part of that plan should include specific penalties &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Protect Your Security Data&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[329,39],"tags":[],"class_list":["post-3122","post","type-post","status-publish","format-standard","hentry","category-data-security","category-newletters"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Security Data - Conner Ash<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Security Data - Conner Ash\" \/>\n<meta property=\"og:description\" content=\"Quite often, data security concerns surface when an employee leaves. But that\u2019s not the only time your data may be at risk. HAVE A PLAN If you have yet to develop a data protection policy that applies to both new hires and existing employees, do so now. Part of that plan should include specific penalties &hellip; Continue reading &quot;Protect Your Security Data&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Conner Ash\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T21:07:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-17T21:09:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg\" \/>\n<meta name=\"author\" content=\"Suzanne Watson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Suzanne Watson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/\"},\"author\":{\"name\":\"Suzanne Watson\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/#\\\/schema\\\/person\\\/2981787dac46b1dabe881c3f3d1cb3f0\"},\"headline\":\"Protect Your Security Data\",\"datePublished\":\"2024-05-02T21:07:16+00:00\",\"dateModified\":\"2024-05-17T21:09:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/\"},\"wordCount\":198,\"image\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Protect_Your_Security_Data.jpg\",\"articleSection\":[\"Data Security\",\"Newsletters\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/\",\"url\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/\",\"name\":\"Protect Your Security Data - Conner Ash\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Protect_Your_Security_Data.jpg\",\"datePublished\":\"2024-05-02T21:07:16+00:00\",\"dateModified\":\"2024-05-17T21:09:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/#\\\/schema\\\/person\\\/2981787dac46b1dabe881c3f3d1cb3f0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Protect_Your_Security_Data.jpg\",\"contentUrl\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Protect_Your_Security_Data.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Select the icon security on the virtual display. Side view of female hand typing keyboard. Business, technology, internet and networking concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/protect-your-security-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Security Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/\",\"name\":\"Conner Ash\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/#\\\/schema\\\/person\\\/2981787dac46b1dabe881c3f3d1cb3f0\",\"name\":\"Suzanne Watson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g\",\"caption\":\"Suzanne Watson\"},\"url\":\"https:\\\/\\\/www.connerash.com\\\/blog\\\/author\\\/swatsonconnerash-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Security Data - Conner Ash","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Security Data - Conner Ash","og_description":"Quite often, data security concerns surface when an employee leaves. But that\u2019s not the only time your data may be at risk. HAVE A PLAN If you have yet to develop a data protection policy that applies to both new hires and existing employees, do so now. Part of that plan should include specific penalties &hellip; Continue reading \"Protect Your Security Data\"","og_url":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/","og_site_name":"Conner Ash","article_published_time":"2024-05-02T21:07:16+00:00","article_modified_time":"2024-05-17T21:09:32+00:00","og_image":[{"url":"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg","type":"","width":"","height":""}],"author":"Suzanne Watson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Suzanne Watson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#article","isPartOf":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/"},"author":{"name":"Suzanne Watson","@id":"https:\/\/www.connerash.com\/blog\/#\/schema\/person\/2981787dac46b1dabe881c3f3d1cb3f0"},"headline":"Protect Your Security Data","datePublished":"2024-05-02T21:07:16+00:00","dateModified":"2024-05-17T21:09:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/"},"wordCount":198,"image":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg","articleSection":["Data Security","Newsletters"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/","url":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/","name":"Protect Your Security Data - Conner Ash","isPartOf":{"@id":"https:\/\/www.connerash.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#primaryimage"},"image":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg","datePublished":"2024-05-02T21:07:16+00:00","dateModified":"2024-05-17T21:09:32+00:00","author":{"@id":"https:\/\/www.connerash.com\/blog\/#\/schema\/person\/2981787dac46b1dabe881c3f3d1cb3f0"},"breadcrumb":{"@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.connerash.com\/blog\/protect-your-security-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#primaryimage","url":"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg","contentUrl":"https:\/\/www.connerash.com\/blog\/wp-content\/uploads\/2024\/05\/Protect_Your_Security_Data.jpg","width":1000,"height":667,"caption":"Select the icon security on the virtual display. Side view of female hand typing keyboard. Business, technology, internet and networking concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.connerash.com\/blog\/protect-your-security-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.connerash.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Security Data"}]},{"@type":"WebSite","@id":"https:\/\/www.connerash.com\/blog\/#website","url":"https:\/\/www.connerash.com\/blog\/","name":"Conner Ash","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.connerash.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.connerash.com\/blog\/#\/schema\/person\/2981787dac46b1dabe881c3f3d1cb3f0","name":"Suzanne Watson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99b3890c91abd2b78da7fea563a1b195b11e45ef03fe39d1330d72a70dc406b8?s=96&d=mm&r=g","caption":"Suzanne Watson"},"url":"https:\/\/www.connerash.com\/blog\/author\/swatsonconnerash-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/posts\/3122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/comments?post=3122"}],"version-history":[{"count":1,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/posts\/3122\/revisions"}],"predecessor-version":[{"id":3124,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/posts\/3122\/revisions\/3124"}],"wp:attachment":[{"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/media?parent=3122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/categories?post=3122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.connerash.com\/blog\/wp-json\/wp\/v2\/tags?post=3122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}