A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

Let’s Talk About Data

It’s now considered the “Information Age” resplendent with an ever growing array of choices, mediums, aggregators, feeds, and resources to fuel potential need for information. Data management has become one of the critical drivers in small business and enterprise alike. Without fully understanding the value associated with available data, small business owners can mistakenly fear and avoid valuable tools for success. The need for useful marketing knowledge directly affects the balance between personal data privacy and educated decisions. As an individual or company, “knowing” can be a necessary evil or value depending on point of view.Data Management is Necessary for Small Business

Is Big Brother Watching?

Advent of web-based communication structures has created a way for anyone, from the government down to a small marketing agency, to gather and use data. Buying patterns, preferences, need, access to services, and product education are just a few of the objectives for interested parties to evaluate. Individuals can access “free” information in the form of downloads, whitepapers, blogs, feeds and newsletters but there is a cost. The cost is publishing of business and/or personal information. The government is passing laws and statues in response to both real and perceived fears concerning availability of data. The basic question is, “Who is responsible for management and control?” The answer lies in your personal behavior.

Behavior and Control

Surfing the Internet, looking up information in a reference, viewing videos, downloading white papers, posting to social media, etc. are all ways that individuals contribute to public profiling and give access to potential proprietary information. In each case, the immediate need outweighs the risk and data is created. How many times do you post to social media sites, upload/download pictures, shop for the best price, evaluate a company’s reputation, or text message? These activities are becoming mainstream and normal. The real issue is understanding impact of each behavior as it relates to you or your small business. Look to personal habits to evaluate how much risk is inherent and what can or needs to be changed.

Small Business Use

With the growing popularity of social media, shrinking use of print, and thirst for knowledge small business owners have to come to terms with the new Data-Driven Economy (DDME) and how to market effectively. Proliferation of online services create a unique opportunity for educated small business owners to operate like much larger companies. Digital marketing, targeted mailing, direct response, opt-in, RSS feeds, and video are leveling the playing field in the battle of customer acquisition and management. Selling products across the globe is just as common as providing products across the street. In today’s marketplace, every small business has an ability to reach a far larger potential audience than ever before. The only obstacle is in how to make it happen.

What To Do

The key is building a critical knowledge base and making decisions based on facts and opportunity rather than fear and reaction. Take stock of your digital assets and protect them by obtaining copyright, use of watermarks, cataloging, and implementation of usage policies. Optimize your social media to focus on targeted audience interests rather than self promotion. Create methods for potential customers to partake of your targeted information stream through blogging, RSS feeds, newsletters, and publicity. Link your collateral portfolio and web experience to provide an integrated message platform for your products or services. Above all else, don’t fear the flow of information, just manage it.

Who’s Really Responsible For Your Personal Data?

Well, 2014 started off with a bang. Retailers in the United States found just how far behind they are in consumer protection. Almost every major media channel has covered aspects of the story and tried to make sense of the fallout and inadequacies of the current systems. Blame is moving around faster than a comet in space and everyone seems to be centered on the why and how, not on solutions. I guess fear still sells in this day and age, unfortunately.

Don't Be a TargetWhat to Do?

Shift your focus from the problem to a permanent solution. Click here to read about a personal protection example of a contractor who followed the rules only to have Dunn & Bradstreet sell his data. He didn’t realize the potential threat to his security until  too late. Education is the key. Take control of personal/business data and stop walking around with a “target” painted on your back. The first step entails understanding how a situation can/has affected personal credit, buying habits, and daily life. Once your analysis is complete, put the results in perspective and take action. The following tips should help to create a short-term game plan.

Change User Names & Passwords

No better way for someone to obtain personal information than by hacking into social media accounts or personal and business accounts using user names and “reset” passwords. Many services encourage a ritual of changing passwords but always say, “make it easy to remember“, “don’t give it out“, and store it in a safe place“. The best practice is to create a user name/password data base and store it offline. It should be compartmentalized in terms of need. Daily accessed accounts should be in one place and seldom used information stored elsewhere. Diverse storage decreases the impact of a breach. Each user name/password combination should be somewhat difficult to remember but accessible. Blending a selection of numbers, lower and upper case letters, symbols, and punctuation in a long string will provide the best security. Stay away from first name, last name, birth date, or any other personal data; because in the process of trying to get through the “security” wall; this data is automatically tested. An interesting fact, many security issues arise from family members and friends who have “temporary” access to a particular account or service. Best advice: keep your data to yourself… period!

Maintain a Regular Credit Vigil

Aside from the industry mantra of running your credit scores at least 2  times a year, develop the habit of evaluating “high exposure financial information” for unusual changes. Examples include credit lines, credit cards, revolving accounts, and bank balances. Stay in regular contact with your financial vendors communicating about travel and business plans and expenses to ensure limited exposure in case of a breach.

Minimize use of Regular Credit Cards and Debit

If you haven’t done so by now, use prepaid credit cards or cash for online services, purchases, and subscriptions. They require a little more maintenance and may cost a bit more but the heightened security is a  godsend when trying to protect personal information. The prepaid card account limits your risk. Be careful not to link deposit capability directly with checking or savings accounts. The link can be manipulated. Debit cards and ATM, although convenient, are a straight connection to your money and one of the easiest ways to lose cash that won’t be replaced by financial institutions. Scary, huh?

Obtain a Registered Address or PO Box

Another simple technique to protect personal data is registering your business address through an agent and use a post office box for mail service. Legal service and mail is forwarded and your exact location is not compromised. Having a registered address on a prepaid credit card further limits financial and personal exposure.

Create a Surfing E-mail Account and Profile

Simply the best way to reduce risk on the Internet is creation of a “free” e-mail account on one of  the main e-mail sites like Yahoo, MSN, .Live, AOL, or Google and build the profile with limited information to protect your computer from spam, hacking, malware, and viruses. Requesting or signing up for information can be channeled through the dummy account and screened for importance.

Update your Anti-virus, Spam Blocker, and Firewalls

Perhaps a no-brainer to some, but everyone should check the validity and performance of their security software at least every 6 weeks when changing passwords/username combinations. Familiarity with limitations of the source, software or service, provides another check point in evaluating value of information given “free” over the web. How often does the media pop in a story about viruses buried in an attachment or the body of a e-mail message?

Delete Temporary Files and Clean Hard Drives

Operate a clean environment within your PC or portable device. Removing unwanted tracking like cookies and temporary files can help in maintaining better security and stop personal web use habits becoming public.

Buy a Shredder

Buy a shredder. That’s right! Spend a few bucks and purchase a small unit for the home office or work. Follow a simple rule.  When in doubt….SHRED IT! Take an additional precaution of separating the shredded material and depositing it in the trash using a randomizing program. Splitting the data makes it harder to piece together. Ideally, complete destruction (burning) or a document disposal service are best but have a significant cost associated with them.

Manage Long-Term Storage

A final tip is to create and manage long-term storage of digital records, paper records like tax returns, bank statements, mortgage statements, etc. Adopt a policy of review and final destruction to make sure that personal information is not available for potential theft.

The bottom line: you are the best safeguard for your data. Educate and take an active role in protection.

Return to Top...