If your business is connected to the internet, you are a target – is your business ready?
Mobile devices & smart phones make business easier to transact - they also dramatically increase the likelihood for theft and fraudulent use of your most valuable company asset: information.
Customer lists, job applications, invoices, medical records, credit card numbers, bank statements - all prime targets for the sophisticated (and in most cases, the UNsophisticated) cyber-criminal.
And what about paper documents? How do you secure them?
Hear Omaha-based experts review the three critical components when protecting your company’s information assets:
Technology
- Mobile phones, tablets, laptops. Modems, wireless routers, storage devices - all gateways to your organization’s data. Learn what strategies are most important to protecting these devices, the user, and your customer’s privacy.
Policies & Procedures
- What needs to be protected, how all types of data should be handled, authorization to access it and preparedness in the event there is a breach. Understand the elusive definition of “sensitive data” and what types of information demand protection.
Information Destruction
- Proper, secure and final disposal is the only way to protect your information. Learn to navigate the differences of your final disposal options and requirements.
Attendees are invited to bring one box of documents or two hard drives for free safe and secure destruction, provided by DataShield Corporation. This service will begin at 7 a.m. and end at 8:30 a.m.
Presenters include:
Phil Lieber and Drew Embury, P & L Technology
Mike Welna and Ken Cole, Continuum Security Solutions
Brian Gubbels, DataShield Corporation
Host Sponsor:
Dave & Buster’s