{"id":644,"date":"2016-08-10T05:12:32","date_gmt":"2016-08-10T05:12:32","guid":{"rendered":"https:\/\/www.shredeasy.com.au\/?p=644"},"modified":"2016-08-10T05:12:32","modified_gmt":"2016-08-10T05:12:32","slug":"avoid-data-breach","status":"publish","type":"post","link":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/","title":{"rendered":"How to Avoid a Data Breach"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2016\/08\/Avoid-a-Data-Breach-in-Australia-Data-Destruction-300x226.jpg\" alt=\"Avoid a Data Breach in Australia - Data Destruction\" width=\"300\" height=\"226\" class=\"alignnone size-medium wp-image-650\" \/><br \/>\n&nbsp;<\/p>\n<h2>What is a Data Breach?<\/h2>\n<p>A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user. There are many different types of data breaches, including viewing or theft of personal health records, identity information, trade secrets or intellectual property, among others. One of the most common instances of a data breach is an unauthorised person hacking into a corporate network to steal sensitive information.<br \/>\n&nbsp;<\/p>\n<h3>What Data Breach Does to Your PC<\/h3>\n<p>If hackers are able to penetrate your computer\u2019s security, they can potentially access a treasure trove of personal information. In the event of a data breach, hackers can access everything from your email accounts to bank and credit card details, to company trade secrets.\u00a0 <a href=\"http:\/\/www.telegraph.co.uk\/technology\/internet-security\/11153381\/How-hackers-took-over-my-computer.html\">If left undetected, an unauthorised user can become administrator of your PC<\/a>; seeing everything you do online and even controlling your PC.<br \/>\n&nbsp;<\/p>\n<h2>Avoiding Data Breaches<\/h2>\n<p>While it may seem a losing battle, there are practical steps you can take to protect your company from potentially costly, dangerous data breaches. These include:<br \/>\n&nbsp;<\/p>\n<h3>Don\u2019t Rely on Encryption<\/h3>\n<p>Encrypting data is a fantastic protective mechanism, but when relied upon exclusively, it can lull your company into a false sense of security.\u00a0 While the majority of data breaches are reported and appropriately dealt with, encryption can fail, resulting in the theft of sensitive company information.<br \/>\n&nbsp;<\/p>\n<h3>Stay Up-to-Date on Security Trends<\/h3>\n<p>A \u201cpatch\u201d is tech-speak for a security update. While updates may seem like a nuisance, an unpatched PC is operating with a weak spot, leaving it vulnerable to cyber-attacks. Although applying patches will take time and resources, they are vital to the online security of any small or large business.<br \/>\n&nbsp;<\/p>\n<h3>Perform Regular Vulnerability Assessments<\/h3>\n<p>Business models and operations are in a state of constant change, so your security must reflect these changes to stay effective. To determine whether you have opened yourself up to new risks and liabilities, you can conduct an internal company audit, as well as engage <a href=\"http:\/\/www.shredeasy.com.au\/getting-your-confidential-papers-shredded\/\">specialised external resources<\/a>. These preventative measures will ensure your confidential information is inaccessible to outsiders.<br \/>\n&nbsp;<\/p>\n<h3>Remove the Data \u2013 Remove the Risk<\/h3>\n<p>Businesses collect extensive amounts of digital data and some of the time it is important to keep this information. In any business, there are invariably records that you no longer need. Once it becomes unnecessary to store, confidential data goes from being an asset to a liability. Consider <a href=\"http:\/\/www.shredeasy.com.au\/5-things-you-should-know-about-technology-shredding\/\">technology destruction services<\/a> and even paper shredding for all your hard copy documents. This prevents data breaches on two levels \u2013 both digital and physical.<br \/>\n&nbsp;<\/p>\n<h3>Invest in Staff Training<\/h3>\n<p>Perhaps the most effective preventative measure is investing in regular staff training. When done correctly, end user security awareness training can change the company culture to become more security-minded. Training employees will eliminate many common mistakes that could lead to a breach, as well as helping them spot suspect behaviour.<br \/>\n&nbsp;<\/p>\n<h2>Contact Us<\/h2>\n<p>Sadly, almost all businesses can fall victim to data breach. To ensure it doesn\u2019t happen to you, call <a href=\"http:\/\/www.shredeasy.com.au\/contact-us\/\">Brisbane\u2019s commercial shredding experts<\/a> today. With one-off and corporate document destruction, on-site shredding services and more, Shred Easy makes it easier than ever to avoid data breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user. There are many different types of data breaches, including viewing or theft of personal health records, identity information, trade secrets or intellectual property, among others. One of the most common instances of a data breach is an unauthorised person hacking into a corporate network to steal sensitive information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-644","post","type-post","status-publish","format-standard","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Avoid a Data Breach - Digital Data Destruction - Shred Easy<\/title>\n<meta name=\"description\" content=\"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid a Data Breach - Digital Data Destruction - Shred Easy\" \/>\n<meta property=\"og:description\" content=\"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Shred Easy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/destroyyourdocuments\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-10T05:12:32+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2016\/08\/Avoid-a-Data-Breach-in-Australia-Data-Destruction-300x226.jpg\" \/>\n<meta name=\"author\" content=\"Caleb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/\",\"url\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/\",\"name\":\"How to Avoid a Data Breach - Digital Data Destruction - Shred Easy\",\"isPartOf\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website\"},\"datePublished\":\"2016-08-10T05:12:32+00:00\",\"dateModified\":\"2016-08-10T05:12:32+00:00\",\"author\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28\"},\"description\":\"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?\",\"breadcrumb\":{\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid a Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website\",\"url\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/\",\"name\":\"Shred Easy\",\"description\":\"Shred Easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28\",\"name\":\"Caleb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g\",\"caption\":\"Caleb\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid a Data Breach - Digital Data Destruction - Shred Easy","description":"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Avoid a Data Breach - Digital Data Destruction - Shred Easy","og_description":"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?","og_url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/","og_site_name":"Shred Easy","article_publisher":"https:\/\/www.facebook.com\/destroyyourdocuments\/","article_published_time":"2016-08-10T05:12:32+00:00","og_image":[{"url":"http:\/\/www.shredeasy.com.au\/wp-content\/uploads\/2016\/08\/Avoid-a-Data-Breach-in-Australia-Data-Destruction-300x226.jpg"}],"author":"Caleb","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/","url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/","name":"How to Avoid a Data Breach - Digital Data Destruction - Shred Easy","isPartOf":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website"},"datePublished":"2016-08-10T05:12:32+00:00","dateModified":"2016-08-10T05:12:32+00:00","author":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28"},"description":"A data breach is an incident in which sensitive or protected data has been viewed, stolen or used by an unauthorised user - so how do you avoid it?","breadcrumb":{"@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/avoid-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/"},{"@type":"ListItem","position":2,"name":"How to Avoid a Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#website","url":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/","name":"Shred Easy","description":"Shred Easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/548f9d89417ffa9591c3bf58cfcb5e28","name":"Caleb","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9b194c55b28dd0d4d4c1c805b293fe8a4b180c2c65ef824eef3a4da4584151f?s=96&d=mm&r=g","caption":"Caleb"}}]}},"_links":{"self":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts\/644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/comments?post=644"}],"version-history":[{"count":0,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/posts\/644\/revisions"}],"wp:attachment":[{"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/media?parent=644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/categories?post=644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/calebgittins.com.au\/staging\/shred-easy\/wp-json\/wp\/v2\/tags?post=644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}