Each organization working with personal information must apply a set of organizational and technical measures to ensure its safety. The set of such measures and methods of protecting personal data are determined taking into account a specific category.
In the process of creating systems of technological and administrative decisions, a model of potential threats is used, which considers two types of dangers:
external;
internal.
Let us dwell on each of them in more detail.
External threats
External threats are related to las vegas email list illegal penetration into a company's information systems (for example, hacker attacks). In Russia, the actions of Internet pirates rarely pose a real danger to the health and life of the population.
Mass leaks of personal data from the Central Bank of the Russian Federation, the State Traffic Safety Inspectorate, and the Pension Fund have ceased. Their networks have reliable protection, and the disclosure of information recorded with complex coding algorithms that cannot be personalized does not pose a particular danger. The number of external attacks on online banking resources has also significantly decreased.
Download a free selection of tools for calculating KPIs and increasing marketing metrics
Alexander Kuleshov
Alexander Kuleshov
General Director of Sales Generator LLC
Read more posts on my personal blog:
Over the past 7 years, we have conducted over 23,000 comprehensive website audits and I have learned that all of us as leaders need clear and working algorithms for our marketing and sales.
Today we will share with you 6 of the most valuable documents that we have developed for our clients.
Download for free and implement today:
Step-by-step guide to creating marketing KPIs
Template for calculating KPIs for a marketer
9 Examples of Universal Selling Commercial Proposals
Upgrade your CPs to close more deals
How to make KPI for the sales department so that profits grow by 20% or more?
Step-by-step template for calculating KPIs for OP managers
Checklist of 12 main indicators for website promotion
Find out what metrics are needed to properly optimize your website
40 Services for Working with Blog Content
We have collected the best services for working with content
How to define your target audience without mistakes?
A proven guide to defining a company's target audience
Download the collection for free
pdf 8.3 mb
doc 3.4 mb
Already downloaded
153438
Internal risks
Internal attacks are much more common. People leave their personal information in various medical organizations or in travel agencies, where almost all information about their financial situation is disclosed to obtain a visa. Often in these cases, consent to the processing of personal data is not signed.
As a result of such actions, passport data, information about real estate, salaries, and bank accounts are stored unprotected on a PC that does not have reliable antivirus protection.
Hacker attacks
Source: shutterstock.com
You can access them:
in the event of direct penetration of a computer by an unscrupulous employee or access to material information carriers;
when placing data in cloud networks, sometimes on multiple servers, often located in other countries. The law provides for a requirement to store personal information within the country, but not all operators comply with it. Often they have not even heard of the existence of such an obligation;
when a laptop or briefcase of an organization employee is stolen, which contains information of interest to the attacker.
Often, courts consider cases of leakage of personal data, for which doctors or employees of banking institutions are punished (for example, related to passport data). This indicates the existence of serious problems in this area.
Recommended articles on this topic:
9 Types of Customer Loyalty Programs
Selling price list: 5 marketing tricks + 10 tips for design
Marketing Tips: How to Show That Your Product is the Best.