{"id":23323,"date":"2018-08-02T07:54:32","date_gmt":"2018-08-02T11:54:32","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=23323"},"modified":"2019-11-15T06:34:49","modified_gmt":"2019-11-15T11:34:49","slug":"customer-data","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/customer-data\/23323\/","title":{"rendered":"Who has access to your customers&#8217; information?"},"content":{"rendered":"<p>Do you know who has access to the data your customers entrusted to you? Are you absolutely sure you know? Can you be sure your employees are handling this data properly while working with it? Nowadays many online tools and <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/cloud\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">cloud<\/a> services help simplify in-team data exchange \u2014 but simplification of exchange can lead to complication of data protection.<\/p>\n<p>What can go wrong? In a word, everything. Most problems come down to common mistakes: someone sends corporate data to personal e-mail to work from home; an employee uploads data to a file-sharing service to be able to access it while traveling; the team works with an online version of a document that can be accessed from a direct link; cloud services are misconfigured. According to our recent survey, \u201cGrowing businesses safely: Cloud adoption vs. security concerns,\u201d 58% of SMBs use various public-cloud-based business applications to work with customers\u2019 data.<\/p>\n<p>Don\u2019t forget about classical pre-cloud-era mistakes, either. Working with data on personal unprotected mobile devices, or carrying it on removable media that can be lost or stolen, remain popular ways to put customer data at risk. Others include disposal of printed copies of that information into common trash, or allowing access to the information by unauthorized employees.<\/p>\n<p>Potentially, that data can be used by different parties \u2014 competitors, disgruntled employees, cybercriminals \u2014 to harm you in a variety of ways such as tarnishing your reputation or holding data for ransom.<\/p>\n<p>Keeping and processing your customers\u2019 data safely requires not only robust protection that extends to the cloud, but also certain internal measures. Businesses that operate in Europe and fall under the jurisdiction of GDPR should already be familiar with the concepts. However, they still need to keep in mind that the information they need to protect is not necessarily limited to \u201cpersonal data.\u201d<\/p>\n<p>To be sure that the information your clients entrust to you will not fall into the wrong hands, you need to know what data you are working with, which employees have access to it, how it is processed, and how it is disposed of. Get started by:<\/p>\n<ul>\n<li>Creating a list of assets your employees use;<\/li>\n<li>Making a list of the online services your organization uses, and analyzing which of them are critical for your business processes;<\/li>\n<li>Auditing critical services and their settings;<\/li>\n<li>Setting clear guidelines for which data can be moved to the cloud and which must stay internal;<\/li>\n<li>Setting guidelines for which data can be accessed by which employees;<\/li>\n<li>Arranging security awareness training to teach staff how to handle critical data safely;<\/li>\n<li>Using a reliable security solution.<\/li>\n<\/ul>\n<p>According to the survey, 26% of SMBs see data protection as their number one business challenge. That means the other 74% probably aren\u2019t paying enough attention to this problem.<\/p>\n<p>Want to learn more about the results of this survey? Download our report, \u201c<a target=\"_blank\" href=\"https:\/\/kas.pr\/c48p\" rel=\"noopener noreferrer\">Growing businesses safely: Cloud adoption vs. security concerns<\/a>\u201d (PDF).<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"cloudhub\">\n","protected":false},"excerpt":{"rendered":"<p>58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.<\/p>\n","protected":false},"author":700,"featured_media":23338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[816,260,2443,614,97],"class_list":{"0":"post-23323","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cloud","10":"tag-data-protection","11":"tag-msp","12":"tag-report","13":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/customer-data\/23323\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/customer-data\/13791\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/customer-data\/11544\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/customer-data\/15826\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/customer-data\/13240\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/customer-data\/16628\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/customer-data\/16056\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/customer-data\/11133\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/customer-data\/17399\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/customer-data\/21192\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/customer-data\/20704\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/customer-data\/20703\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cloud\/","name":"cloud"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23323"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23323\/revisions"}],"predecessor-version":[{"id":29669,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23323\/revisions\/29669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23338"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}