Company Information Compliance Summary

1087 Words3 Pages

With a growing use of technology in modern society, it is not surprising that many businesses have to take significant measures to protect their company data and keep it secure. It is interesting to know to what lengths a company should go to avoid security beach and ID theft.
I had an opportunity to sit down and meet with a senior manager of the project management office at CVS Health. She stated that computers and mobile phones were an essential part of her workday. When asked how she used technology in the office setting, she discussed how she uses technology to communicate with others, document information, give presentations during meetings, and share live web conferencing. She also added that her laptop is what carries the majority of …show more content…

There is also added security for vpn (virtual private network) when work employees work remotely. Most importantly, there is a document that you have to sign before you get hired which states confidentiality of company information. CVS also has mandatory classes on PII ( personal identifiable identity) and PHI ( protected health information). These classes, which are required every month or so, explain the new policies to protect company information and also explains the non-disclosure of company information that you have to sign at the class.
Some last minute tips and advice that came up at the end of our conversation were: always lock your computer, never leave wireless devices unattended, always have your ID with you, don't share any of your passwords, and always monitor emails for any spoofs/ viruses.
Although I had the inside information I decided to compare what CVS does to protect their company data and security information to what a Business Insiders' article: "10 Essential Data- Security Measures Every Business Should Take" highly recommends a company should do. As I compared the two sources, they both agreed and followed the same security measures. These …show more content…

4. Update your programs regularly. By updating your programs frequently, you stay up to date with any recent issues or holes that programmers have fixed.
5. Secure your laptops. Since laptops are portable by nature, they are also at a higher risk of being lost or stolen than your average company desktop. If your laptop has important information than it is highly recommended that you encrypt it. Encryption software changes the way the information looks on the hard drive so that, without the correct password, it can’t be read. It is highly stressed that you should never, ever leave your laptop in your car, where it’s an easy target for thieves. If you must, lock it in your trunk, but be aware of the consequences of leaving your laptop unattended.
6. Secure your mobile phones. Since smartphones hold so much data these days that you should consider them almost as valuable as company computers—and they’re much more easily lost or stolen. Must haves for mobile phones are an encryption software, password protection, and remote wiping enabled. Remote wiping is “extremely effective” because if the phone is lost or stolen and is carrying valuable information, it can be wiped clean before it can get hacked

Open Document