SlideShare a Scribd company logo
Small Business Guide
to
4 Simple Steps To Protecting You & Your Customers
Evaluate Remove Prevent Dispose
EvaluateYour Company’s Assets & Identify Sensitive
Information
Step1
Develop a list of physical and digital assets located within
each room of your company
*Don’t forget storage, equipment, software & networks for each room
Treat each digital device as an “office room”
Take inventory of all personal and sensitive information stored or transmitted through
these devices.
Answer the following questions for each piece of office
equipment:
EvaluateInformation Security Questionnaire – Digital
Asset Evaluation
Step1
RemoveAll identified security threats & unsecure
practices
Step2
Review your physical & digital asset log to identify sensitive
data you do NOT need
Only request sensitive data on the LAST step of transactions
*Financial data should only be requested for processing payment or tax documents.
NEVER include the expiration date or more than 5 digits on
a sales receipt
All online transactions or sharing of sensitive data should be
done on a Secure Sockets Layer (SSL)
*See final slide of Small Business Guide for secure payroll and ecommerce software
PreventFuture Security Breaches by Addressing Digital
Security
Step 3
Take inventory of new IT equipment that collects sensitive data
*Log each VIN # and check it periodically to ensure it has not been switched
Identify all connections to computers, servers & IT
equipment that may contain sensitive data
*iPhone’s, Dropbox accounts, online fax storage, digital copiers, etc.
Do NOT email sensitive data, use an online fax service
*Faxing is the most secure way to transfer sensitive information, although fax machines are
built with an internal hard drive that is often hacked when a company disposes of it.
Use a Password Management Service
Don’t store sensitive data on electronic devices that are easily
stolen or lost
*If needed, use an online backup service with an encryption & auto-destroy function
PreventFuture Security Breaches by Addressing Physical
Security
Step 3
Define employee guidelines, responsibilities & restrictions upon
new employee hire & in company handbook.
Make sure your employees log-off their computers and lock all
cabinet doors prior to leaving each day.
*iPhone’s, Dropbox accounts, online fax storage, digital copiers, etc.
Do NOT email sensitive data, use an online fax service.
*Faxing is the most secure way to transfer sensitive information, although fax machines are
built with an internal hard drive that is often hacked when a company disposes of it.
Lock all file cabinets with sensitive information & start a “sign
in/out” system each time they are accessed.
*This should be true of off-site storage facilities as well.
DisposeOf any and ALL sensitive information
Step 4
Make shredders available throughout the office,
especially around mail areas, copy or fax machines
*Do not create a “To Be Shredded” box, this will only increase your risk
Erase electronic devices COMPLETELY before removal.
*There are software options available to clean all electronics periodically or wipe
completely
Mail centers and fax machines should be placed in
private area, AWAY from foot traffic
*According to a GFI study, 49% of employees claimed to have seen a paper fax that
was not intended for them
Security Software Recommendations
Explain this point in a few sentences. An infographic
doesn’t necessarily mean you aren’t allowed to use words.
Secure Online Shopping & Payroll
• Intuit GoPayment
• Intuit Online Payroll
Password Management
• Lastpass
• Dashlane
Secure Online Backup
• iDrive
• Carbonite Online Backup
External Hard Drive with “Auto Destroy” Feature
• Apricorn Aegis Padlock 1 TB USB 3.0 256-bit AES XTS Hardware Encrypted Portable External
Hard Drive
• Apricorn Aegis Padlock 500 GB USB 2.0 256-bit Encrypted Portable External Hard Drive
• Apricorn Aegis Secure Key FIPS Validated 16 GB USB 2.0 256-bit AES-CBC Encrypted Flash
Drive
Security Software for Portable Electronics
• LoJack for Laptops
Secure Online Fax Plans
• MetroFax Essential
• Nextiva Single User
• eFax – eFax Plus
Sources
Explain this point in a few sentences. An infographic
doesn’t necessarily mean you aren’t allowed to use words.
ChooseWhat.com would like to thank the following websites for their
help in developing this information security guide.
• http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-
health-plan
• business.ftc.gov/privacy-and-security
• David of FindAFax.com
• www.OnGuardOnline.gov
• Electronic Code of Federal Regulations
• http://business.ftc.gov/documents/bus69-protecting-personal-information-guide-
business
• http://www.sba.gov/category/navigation-structure/starting-managing-
business/managing-business/business-guides-industry
• http://business.ftc.gov/privacy-and-security/data-security
A detailed version of this guide is available here:
http://www.choosewhat.com/starticles/small-business-security-essentials
Sharing is Caring!!
Brought to you by:

More Related Content

PPTX
Essential Layers of IBM i Security Series – Network Security
PPTX
Humming Heads Presentation
PPTX
10 Quick Cybersecurity Wins for Small Business
PPTX
Benefits of IT Outsourcing
PPTX
Data-Centric Protection: The Future of BYOD Security
PDF
Proprietary Information
PPTX
​Understanding the Internet of Things
PPTX
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Essential Layers of IBM i Security Series – Network Security
Humming Heads Presentation
10 Quick Cybersecurity Wins for Small Business
Benefits of IT Outsourcing
Data-Centric Protection: The Future of BYOD Security
Proprietary Information
​Understanding the Internet of Things
The Loss of Intellectual Property in the Digital Age: What Companies can d…

What's hot (18)

PDF
10. hddn-datalekaje-hs-01
PPTX
Null mumbai-reversing-IoT-firmware
PPTX
Null mumbai-iot top 10
PPTX
Sophos Mobile Control - Product Overview
PDF
Andy Blumenthal Talks About Mobility Solutions
PPTX
UniQ-ID Identity and Access Management
PPTX
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
PPTX
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
PPTX
Get the Most From Your Firewall
PDF
The security story behind critical industrial networks
PPTX
Cyber Security Overview for Small Businesses
PDF
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
PDF
odix introduction ransomware prevention in WFH reality 2020
PPTX
mobile application security
PDF
Wireless security toai vm
PDF
Web App Sec Tisc
PPTX
Unique Performance TechSoft Pvt Ltd - Overview
10. hddn-datalekaje-hs-01
Null mumbai-reversing-IoT-firmware
Null mumbai-iot top 10
Sophos Mobile Control - Product Overview
Andy Blumenthal Talks About Mobility Solutions
UniQ-ID Identity and Access Management
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
Get the Most From Your Firewall
The security story behind critical industrial networks
Cyber Security Overview for Small Businesses
The Business Case for Enterprise Endpoint Protection: Can You Afford Not To?
odix introduction ransomware prevention in WFH reality 2020
mobile application security
Wireless security toai vm
Web App Sec Tisc
Unique Performance TechSoft Pvt Ltd - Overview
Ad

Viewers also liked (10)

PPTX
Information Security For Small Business
PPT
Proses Akumulasi Indonesia
PPTX
Business information security requirements
PDF
Information security
PDF
Information Security Business Middle East 2011
PPTX
Information security for small business
PPTX
Management information System and its types
PPT
Sistem Biaya dan Akumulasi Biaya
PPTX
Types o f information systems
PPTX
Business continuity & disaster recovery planning (BCP & DRP)
Information Security For Small Business
Proses Akumulasi Indonesia
Business information security requirements
Information security
Information Security Business Middle East 2011
Information security for small business
Management information System and its types
Sistem Biaya dan Akumulasi Biaya
Types o f information systems
Business continuity & disaster recovery planning (BCP & DRP)
Ad

Similar to Small Business Guide to Information Security (20)

PDF
Protecting Personal Information: A Guide for Business
PDF
best coffee beans in the world, americano
PPTX
5 Step Data Security Plan for Small Businesses
PPT
FTC Protecting Info A Guide For Business Powerpoint
PDF
The Insider Threats - Are You at Risk?
DOCX
Protecting Personal Information A Guide for Businesses Small Bu.docx
PDF
Penntech IT Solutions and cyber security
PDF
A Cybersecurity Planning Guide for CFOs
PDF
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
PDF
How to Bulletproof Your Data Defenses Locally & In the Cloud
PPT
Security in 10 slides
PDF
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Network Security - What Every Business Needs to Know
PPTX
Presentation On Mass Data Privacy Law
PDF
Stackfield Cloud Security 101
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PDF
7 Practices To Safeguard Your Business From Security Breaches!
PDF
Ten Top Tips on Keeping Your Business Secure
Protecting Personal Information: A Guide for Business
best coffee beans in the world, americano
5 Step Data Security Plan for Small Businesses
FTC Protecting Info A Guide For Business Powerpoint
The Insider Threats - Are You at Risk?
Protecting Personal Information A Guide for Businesses Small Bu.docx
Penntech IT Solutions and cyber security
A Cybersecurity Planning Guide for CFOs
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
How to Bulletproof Your Data Defenses Locally & In the Cloud
Security in 10 slides
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Network Security - What Every Business Needs to Know
Presentation On Mass Data Privacy Law
Stackfield Cloud Security 101
Protecting the Crown Jewels – Enlist the Beefeaters
Data Protection - Safeguarding Your Business in the Digital Age.pdf
7 Practices To Safeguard Your Business From Security Breaches!
Ten Top Tips on Keeping Your Business Secure

Recently uploaded (20)

PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PDF
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
PDF
Technical Architecture - Chainsys dataZap
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPTX
Project Management_ SMART Projects Class.pptx
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
basic introduction to research chapter 1.pptx
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
Slide gioi thieu VietinBank Quy 2 - 2025
1911 Gold Corporate Presentation Aug 2025.pdf
Solaris Resources Presentation - Corporate August 2025.pdf
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
Technical Architecture - Chainsys dataZap
Astra-Investor- business Presentation (1).pptx
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
CTG - Business Update 2Q2025 & 6M2025.pptx
Project Management_ SMART Projects Class.pptx
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Digital Marketing & E-commerce Certificate Glossary.pdf.................
basic introduction to research chapter 1.pptx
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Module 2 - Modern Supervison Challenges - Student Resource.pdf
NEW - FEES STRUCTURES (01-july-2024).pdf
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...

Small Business Guide to Information Security

  • 1. Small Business Guide to 4 Simple Steps To Protecting You & Your Customers Evaluate Remove Prevent Dispose
  • 2. EvaluateYour Company’s Assets & Identify Sensitive Information Step1 Develop a list of physical and digital assets located within each room of your company *Don’t forget storage, equipment, software & networks for each room Treat each digital device as an “office room” Take inventory of all personal and sensitive information stored or transmitted through these devices. Answer the following questions for each piece of office equipment:
  • 3. EvaluateInformation Security Questionnaire – Digital Asset Evaluation Step1
  • 4. RemoveAll identified security threats & unsecure practices Step2 Review your physical & digital asset log to identify sensitive data you do NOT need Only request sensitive data on the LAST step of transactions *Financial data should only be requested for processing payment or tax documents. NEVER include the expiration date or more than 5 digits on a sales receipt All online transactions or sharing of sensitive data should be done on a Secure Sockets Layer (SSL) *See final slide of Small Business Guide for secure payroll and ecommerce software
  • 5. PreventFuture Security Breaches by Addressing Digital Security Step 3 Take inventory of new IT equipment that collects sensitive data *Log each VIN # and check it periodically to ensure it has not been switched Identify all connections to computers, servers & IT equipment that may contain sensitive data *iPhone’s, Dropbox accounts, online fax storage, digital copiers, etc. Do NOT email sensitive data, use an online fax service *Faxing is the most secure way to transfer sensitive information, although fax machines are built with an internal hard drive that is often hacked when a company disposes of it. Use a Password Management Service Don’t store sensitive data on electronic devices that are easily stolen or lost *If needed, use an online backup service with an encryption & auto-destroy function
  • 6. PreventFuture Security Breaches by Addressing Physical Security Step 3 Define employee guidelines, responsibilities & restrictions upon new employee hire & in company handbook. Make sure your employees log-off their computers and lock all cabinet doors prior to leaving each day. *iPhone’s, Dropbox accounts, online fax storage, digital copiers, etc. Do NOT email sensitive data, use an online fax service. *Faxing is the most secure way to transfer sensitive information, although fax machines are built with an internal hard drive that is often hacked when a company disposes of it. Lock all file cabinets with sensitive information & start a “sign in/out” system each time they are accessed. *This should be true of off-site storage facilities as well.
  • 7. DisposeOf any and ALL sensitive information Step 4 Make shredders available throughout the office, especially around mail areas, copy or fax machines *Do not create a “To Be Shredded” box, this will only increase your risk Erase electronic devices COMPLETELY before removal. *There are software options available to clean all electronics periodically or wipe completely Mail centers and fax machines should be placed in private area, AWAY from foot traffic *According to a GFI study, 49% of employees claimed to have seen a paper fax that was not intended for them
  • 8. Security Software Recommendations Explain this point in a few sentences. An infographic doesn’t necessarily mean you aren’t allowed to use words. Secure Online Shopping & Payroll • Intuit GoPayment • Intuit Online Payroll Password Management • Lastpass • Dashlane Secure Online Backup • iDrive • Carbonite Online Backup External Hard Drive with “Auto Destroy” Feature • Apricorn Aegis Padlock 1 TB USB 3.0 256-bit AES XTS Hardware Encrypted Portable External Hard Drive • Apricorn Aegis Padlock 500 GB USB 2.0 256-bit Encrypted Portable External Hard Drive • Apricorn Aegis Secure Key FIPS Validated 16 GB USB 2.0 256-bit AES-CBC Encrypted Flash Drive Security Software for Portable Electronics • LoJack for Laptops Secure Online Fax Plans • MetroFax Essential • Nextiva Single User • eFax – eFax Plus
  • 9. Sources Explain this point in a few sentences. An infographic doesn’t necessarily mean you aren’t allowed to use words. ChooseWhat.com would like to thank the following websites for their help in developing this information security guide. • http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care- health-plan • business.ftc.gov/privacy-and-security • David of FindAFax.com • www.OnGuardOnline.gov • Electronic Code of Federal Regulations • http://business.ftc.gov/documents/bus69-protecting-personal-information-guide- business • http://www.sba.gov/category/navigation-structure/starting-managing- business/managing-business/business-guides-industry • http://business.ftc.gov/privacy-and-security/data-security A detailed version of this guide is available here: http://www.choosewhat.com/starticles/small-business-security-essentials