With the number of data breaches increasing each year, it’s becoming more important to know what personal data you have and where you have it. On personal or even work devices, you may be surprised at how much of your data is just waiting to be taken advantage of by a bad actor.
Laptop or desktop computers are the most common places for data to be collecting the virtual dust. It is easy to find data on your desktop or in document folders where you saved it – but what else may be lurking on your computer?
If your computer is tied to Microsoft OneDrive or an application like Microsoft Teams, there is a good chance that everything you do is backed up into another virtual folder. Even if you think you are cleaning up that extra data on your computer, duplicate or even triplicate files may be hidden in a virtual space.
And how about your Downloads folder? When it comes to your computer, less is more. Not only will your computer thank you for your data housekeeping, but also the less data you have when a bad actor gains access, the less you have to worry about.
Consider using external hard drives to hold data that does not connect to the internet, secure virtual storage spaces, or flash drives. Know whether there are any rules or laws that apply to the length of time that you maintain data. If there is no reason to keep the data, delete it.
Bad actors love e-mail accounts. Do you know what you have in yours? Chances are, it’s a lot more than you think. Not all data is obviously identified or searchable in email. There may be data in attachments that you don’t even know is there. For example, if you have a PDF or a PowerPoint deck attached to an email with diagrams or charts, that document may also have an Excel file embedded in it that has personal information.
Fortunately, there are ways to keep your email tidy. These include backing up your account to a virtual archive or secure storage space after a certain period of time, deleting e-mails and setting rules to remove all deleted emails each time you close your email, considering use of a platform like Box to send important documents, and when possible not using email to transfer personal information.
You can also delete attachments that may contain personal data and save them in an alternative location, check your inbox rules once a month, and clear folders like “Delete,” “Junk,” “Spam” “Outbox,” and “Drafts” regularly. Even better, companies can set environments to archive data after 6, 12 or 18 months. This eliminates years of data potentially accessible and synced during an email compromise.
Mobile devices. Can you think of any other device that may be holding personal data? The increase in remote work has also increased the number of people using their personal phones for work purposes. What could possibly go wrong?
Use of a cellular device for work often means that you have a mix of downloaded documents, email accounts, and other applications or platforms that can be shared.
Consider limiting the number of applications that you use or download, keeping your personal and work accounts on separate devices, and following the same hygiene practices that you would use on your computer or in your email account. You can also monitor and consider not using tethering options, file share capabilities, Bluetooth, or other options that make your device discoverable to others.
Conclusion
In today’s environment, guarding your company’s data is more crucial than ever. Knowing what data you hold, whether accidently or on purpose, is half the battle. By managing, securing, and even deleting your information, you can significantly reduce your risk. A little effort now can save a lot of trouble later.
The Constangy Cybersecurity & Data Privacy team assists businesses of all sizes and industries with implementing necessary updates to their privacy and compliance programs to address these complex and evolving regulatory requirements. If you would like additional information on how to prepare your organization, contact us directly at cyber@constangy.com.
- Attorney
Rebecca is a member of the Constangy Cyber Team and affiliated with our Winston-Salem, North Carolina office. She works with our rapid response team and assists clients in responding to various data security incidents such as ...
- Partner
Matt Toldero is a partner and member of the Constangy Cyber Team and is affiliated with our Winston-Salem, North Carolina office. He brings over ten years of combined incident response and risk management experience to his role on our ...
The Constangy Cyber Advisor posts regular updates on legislative developments, data privacy, and information security trends. Our blog posts are informed through the Constangy Cyber Team's experience managing thousands of data breaches, providing robust compliance advisory services, and consultation on complex data privacy and security litigation.
Subscribe
Contributors
- Suzie Allen
- John Babione
- Matthew Basilotto
- Bert Bender
- Ansley Bryan
- Jason Cherry
- Christopher R. Deubert
- Maria Efaplomatidis
- Rebecca D.C. Eng
- Sebastian Fischer
- Laura Funk
- Lauren Godfrey
- Taren N. Greenidge
- Seth Greenwald
- Chasity Henry
- Julie Hess
- Sean Hoar
- Donna Maddux
- David McMillan
- Victoria Okraszewski
- Ashley L. Orler
- Todd Rowe
- Melissa J. Sachs
- Allen Sattler
- Brent Sedge
- Ryan Steidl
- Matthew Toldero
- Alyssa Watzman
- Aubrey Weaver
- Robert R. Wennagel
- Rob Yang
- Xuan Zhou
Archives
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023