{"id":1998,"date":"2016-10-06T09:29:32","date_gmt":"2016-10-06T14:29:32","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=1998"},"modified":"2018-06-26T12:04:07","modified_gmt":"2018-06-26T17:04:07","slug":"8-simple-questions-to-start-an-it-security-discussion","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/","title":{"rendered":"8 Simple Questions to Start an IT Security Discussion"},"content":{"rendered":"<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2012\/04\/lock-network-cable.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1730\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2012\/04\/lock-network-cable-300x202.jpg\" alt=\"Data Security\" width=\"300\" height=\"202\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2012\/04\/lock-network-cable-300x202.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2012\/04\/lock-network-cable-1024x688.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>At this point, it\u2019s impossible to ignore the considerable threat data breaches pose to businesses around the world. A quick Google News search brings up millions of results <a href=\"http:\/\/www.computerweekly.com\/news\/450304977\/Yahoo-sued-over-data-breach\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">topped by<\/a> <a href=\"http:\/\/www.computerworld.com\/article\/3123001\/security\/trump-hotel-chain-fined-over-data-breaches.html\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">headlines<\/a> about companies facing lawsuits and fines because their data was compromised. \u201cNo locale, industry or organization is bulletproof when it comes to the compromise of data,\u201d states Verizon\u2019s <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2016\/\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2016 Data Breach Investigations Report<\/a>, which focuses on incidents that impacted organizations in 82 countries across all industries.<\/p>\n<p>Becoming the victim of a data breach could cost your business in multiple ways. For the private sector overall, there\u2019s a 10% likelihood that the annualized business impact resulting from data breaches will exceed $2.4 million, according to the <a href=\"http:\/\/www.aberdeen.com\/research\/13963\/13963-KB-Effective-Data-Security.aspx\/content.aspx.aspx\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Aberdeen Group<\/a>. Additionally, an incident that results in the exposure or theft of sensitive information could hurt your reputation in the eyes of both current and prospective customers.<\/p>\n<p>The need for all businesses to address data security is clear. However, if you realize your company\u2019s data is at risk, how can you maximize the effectiveness of your plan to secure it and reduce the odds of a breach as much as possible? If you want to implement a robust data protection program, you should start your IT security discussion by asking yourself the following questions, according to the Aberdeen Group. \u00a0\u00a0\u00a0<strong><\/p>\n<p>1. How much data do you have to protect? <\/strong>The first step to securing sensitive information is knowing how much of it you\u2019re actually handling.<\/p>\n<p><strong>2. Where is your data stored? <\/strong>Once you know what you\u2019re dealing with, you have to account for where it\u2019s housed. Businesses need to take steps to secure all of their data, both on- and off-premises.<\/p>\n<p><strong>3. How many locations do you have? <\/strong>Businesses that have multiple locations and\/or leverage data centers for their applications or infrastructure will need to include these items in the discussion.<\/p>\n<p><strong>4. How do you send and share data? <\/strong>Businesses typically have multiple methods of sending and sharing information, and some of them typically aren\u2019t secure. Do you send and share your info through email, USB, or a collaboration tool such as Dropbox or Box?<br \/>\n<strong><br \/>\n5. Who can access the data? <\/strong>Another key foundational element of safeguarding data is ensuring you know who can access it, in addition to their typical access patterns.<\/p>\n<p><strong>6. Do you allow your staff to access data from any device? <\/strong>If you do, then you\u2019re opening up the security discussion to include those devices.<strong><\/p>\n<p>7. Have you established clear data handling policies? <\/strong>Your organization can\u2019t achieve maximum data security without universally instituting guidelines for handling specific types of information. Getting everyone on the same page is crucial if your business wants to minimize the risk of a breach.<\/p>\n<p><strong>8. What does your insurance company require?<\/strong> Each year as cyber-attacks get more intelligent, insurance companies add more requirements for additional coverage options and minimum benchmarks.<\/p>\n<p>If you\u2019d like more guidance after answering these questions, our expert team at Stratosphere Networks can provide you with information about data security. We offer extensive data protection solutions \u2013 such as secure VPN, spam filtering, and more \u2013 for businesses of all sizes and across all industries. To learn more, contact us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetowrks.com\" target=\"_blank\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this point, it\u2019s impossible to ignore the considerable threat data breaches pose to businesses around the world. A quick Google News search brings up millions of results topped by headlines about companies facing lawsuits and fines because their data &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-1998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>8 Simple Questions to Start an IT Security Discussion<\/title>\n<meta name=\"description\" content=\"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Simple Questions to Start an IT Security Discussion\" \/>\n<meta property=\"og:description\" content=\"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-06T14:29:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:04:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"8 Simple Questions to Start an IT Security Discussion\",\"datePublished\":\"2016-10-06T14:29:32+00:00\",\"dateModified\":\"2018-06-26T17:04:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\"},\"wordCount\":544,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\",\"name\":\"8 Simple Questions to Start an IT Security Discussion\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2016-10-06T14:29:32+00:00\",\"dateModified\":\"2018-06-26T17:04:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Simple Questions to Start an IT Security Discussion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"8 Simple Questions to Start an IT Security Discussion","description":"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/","og_locale":"en_US","og_type":"article","og_title":"8 Simple Questions to Start an IT Security Discussion","og_description":"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2016-10-06T14:29:32+00:00","article_modified_time":"2018-06-26T17:04:07+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"8 Simple Questions to Start an IT Security Discussion","datePublished":"2016-10-06T14:29:32+00:00","dateModified":"2018-06-26T17:04:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/"},"wordCount":544,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/","name":"8 Simple Questions to Start an IT Security Discussion","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2016-10-06T14:29:32+00:00","dateModified":"2018-06-26T17:04:07+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"Answering these questions can help your business implement an effective data security program and guard against potentially costly breaches.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/8-simple-questions-to-start-an-it-security-discussion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 Simple Questions to Start an IT Security Discussion"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1998"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1998\/revisions"}],"predecessor-version":[{"id":2000,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1998\/revisions\/2000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}