Data Security Guide v2

For example, anti-virus protection only works against threats that have been identified. For new viruses, you must have a process in place to respond quickly to mitigate attacks. BUILD A PROACTIVE DEFENSE

The goal is to have a business continuity plan that reduces threats and positions an organization to resume usual business operations as soon as possible. That plan is only as strong as its weakest link. When building a defense, one of the biggest challenges is preparing for unknown threats. That’s why it’s vital to have a process in place to respond to new threats and unanticipated events.

Defensive MVPs

The majority of breaches can be isolated back to user error. So one of the most important aspects of a good defensive data security program is thorough training for associates.

• Use proactive training so associates are capable of identifying potential threats.

• Intrusion testing can help pinpoint vulnerabilities in procedures and technology.

• The internal data security environment should leverage both good business practices and good security practices.

Your business continuity planning must be based on a proactive defense and a reactive offense. A supply chain partner that offers deep technology expertise and a secure, unified transportation management environment can provide both.

Made with FlippingBook - Online magazine maker