Smart ways businesses can protect customer data Featured

Smart ways businesses can protect customer data

'The ICO told businesses that ultimately it is their responsibility to ensure customer data is safe and secure.

Companies can keep customer data secure in a numerous ways.

The Information Commissioners Office (ICO) has warned organisations that they should be doing everything they can to keep the personal customer data safe, as more consumers become resigned to the fact that their private information is being collected by private firms.

A YouGov survey, found that 72% of British consumers are worried about personal data such as email, chat logs, files and pictures being accessed, prompted the ICO to tell businesses that ultimately it is their responsibility to ensure customer data is secure.

With data breaches on the rise and their impact being predicted to affect companies for years to come, cyber criminals are continuously getting smarter about hacking their target systems.

Now that data protection regulations like GDPR are now in full swing, customer data protection should be prioritised more than ever by companies.

With that in mind, security company Sophos shares its expertise on how businesses can fulfil their responsibility to protect their customers.


1. Ensure you have effective endpoint, network and email protection that filters out spam, malware and dangerous file types.

2. Train employees to be suspicious of emails, especially those that contain attachments, and to report any unusual emails or attachment behaviour to the IT department straightaway.

3. Consider a patch assessment tool to ensure your operating system and applications are up to date with the latest security fixes. Most exploit kits see success due to exploits in software for which a patch is already available and just has not been deployed.

4. Install endpoint protection software and/or a secure web gateway that can identify and block exploit kits before they infect your systems.

5. Crooks want to capture more than just one user’s password and confidential files – they want access to your back-end databases, your PoS network and your testing network. Consider segregating your networks with next-generation firewalls that treat your internal departments as potentially hostile to each other, rather than having one big “inside” fenced off from the even bigger “outside”.

6. Put in place a device control strategy to identify and control the use of removable storage devices – not only does this prevent bad stuff getting in, with data loss prevention DLP, but it can also help stop personally identifiable information (PII) and intellectual property (IP) data from going out.


7. Implement full disk protection and encrypt sensitive data stored on servers or removable media for sharing with business partners.

8. Use application control to keep track of, and restrict, unnecessary software that reduces security without adding any needed benefit.

9. Implement a data protection policy which guides employees on how to keep personal data secure.

10. If you move to the cloud make sure that the ability to encrypt the data – both in the cloud and also when being transferred – is a must.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or LinkedIn.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

back to top

Popular Help and Advice

How to Limit Facebook From Tracking What You Do

How to Limit Facebook From Tracking What You Do

13 January, 2020

You can choose to stop some of the web activity being used to target you with ads by visiting the YourAdChoices site run...

Cable Haunt Flaw Leaves Millions of US Modems at Risk

Cable Haunt Flaw Leaves Millions of US Modems at Risk

13 January, 2020

Multiple cable modems used by ISPs to provide broadband into homes have a critical vulnerability in their underlying ref...

What is a proxy server?

What is a proxy server?

09 January, 2020

A proxy server – is a computer on the internet which acts as a middle-man between your computer and the website or ser...

Americans still vulnerable to foreign hacking tactics, DOJ official says

Americans still vulnerable to foreign hacking tactics, DOJ official says

18 January, 2020

Because of the 2020 election campaigning, a senior Department of Justice official says he worries that Americans are sti...

What is a VPN tunnel?

What is a VPN tunnel?

04 December, 2019

VPN stands for Virtual Private Network and used to be used mainly by employees connecting to their company network remot...

Cyber Security A to Z

Cyber Security A to Z

03 November, 2019

The world of cyber security is wide-ranging and fascinating, and one that must adapt and move as quickly then those who ...


Sign up to keep in touch!

Be the first to hear the latest Cyber and Tech News straight to your mailbox.

Check out our Privacy Policy & Terms of use
You can unsubscribe from email list at any time