The SCORE 2015 Issue 2 | Page 37

metadata, eliminating IP addresses, email addresses and the like? When customers allow for their data to be stored, they will expect that the business is taking all measures and steps to protect this data. If the information is stolen, the customer will most certainly look to the business for blame. Once this happens, the businesses reputation and credibility is at stake, trust is reduced or eliminated and potential liability soars. It matters not that your business is a Fortune 100 company or a smaller operation. Below is a list of some of the steps a business may take to reduce the exposure to a cyber-hacker. The list is not exhaustive, but suggestions to undertake. • Always store the data of the customer in an encrypted database. This makes use of the data much more difficult for the hacker to use it if acquired. • Avoid using a singular password to access any database storing customer information. Use multiple layers and require that the passwords be changed on a regular basis and frequently. • Check to make certain your business is running a malware detection system on the servers and workstations and take steps to e