Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResiliencePhysical SecurityCybersecurity News

Security Talk

The evolution of workplace data privacy best practices

By Maggie Shein
SEC0321-Talk-Feat-slide1_900px

wakila / E+ via Getty Images

SEC0321-Talk-slide2_900px

Bruce Radke, Co-Chair of Privacy and Cybersecurity Practice Group at Polsinelli

(photo courtesy of Polsinelli)

SEC0321-Talk-slide3_900px

Michael Waters, Tech Transitions & Data Privacy Practice, Polsinelli

(photo courtesy of Polsinelli)

SEC0321-talk-slide4_900px
SEC0321-Talk-Feat-slide1_900px
SEC0321-Talk-slide2_900px
SEC0321-Talk-slide3_900px
SEC0321-talk-slide4_900px
March 9, 2021

There has been no shortage of ransomware reports and data breaches affecting companies from all sectors all over the world, accelerated, in part, during 2020 as the COVID-19 pandemic caused a mass move to remote work and many organizations raced to accommodate the new normal. The City of Albany was hit with a ransomware attack where hackers demanded cryptocurrency as payment to recover encrypted files. Jackson County, Ga. paid a $400K ransomware payment to hackers as the breach kept prison guards from being able to remotely open prison cells. At the end of 2020, T-Mobile announced a data breach which its cybersecurity team had discovered and shut down malicious, unauthorized access to some information related to T-Mobile accounts. Reported phishing scams impersonating FedEx, UPS and Amazon skyrocketed during the holiday shopping boom. The U.S. Energy Department and National Nuclear Security Administration was reportedly hacked when threat actors accessed their networks as part of a major cyber-espionage operation that affected many U.S. federal agencies. Huntsville City Schools in Alabama closed for a week amid a cyberbreach and Baltimore schools also closed due to a “catastrophic” ransomware attack earlier in 2020. These examples are just the tip of the iceberg as major cyberbreaches and ransomware attacks are being reported in every sector of business and organization public and private.

In particular, phishing scams and ransomware scams are on an upward trend in terms of incidents reported. Though both types of security incidents have been around for many years, because more people are working remotely due to COVID-19, more sensitive documents are being shared over email and sensitive data may be unprotected in an organization’s network, says Michael Waters, member of the Tech Transactions & Data Privacy group at law firm Polsinelli.

Enterprises and organizations across all sectors can take heed from two lessons learned: one, no one is immune from a data breach, and two, preparing for a potential breach of data is crucial. Fortunately, there are a few steps that organizations can take to prepare their organization when it comes to data protection, say Waters and Bruce Radke, Co-Chair of the Privacy and Cybersecurity practice group at Polsinelli.

“One of the first things organizations should do is recognize that remote workers can pose a security issue and take steps to protect data, such as implementing endpoint monitoring and engaging employees in phishing training,” Waters advises.

Another important mitigation strategy for data privacy protection is taking a look at how an organization is managing the backup of its data. Having a segregated encrypted backup, along with making sure those backups are uncorrupted and up-to-date, can help organizations recover from an attack quicker and potentially save them from paying ransom. “One of the mistakes some organizations make is they want their backups ready in the event of a disruption and they don’t segregate it from the original data,” Waters says. In this case, a threat actor can potentially gain control of both the enterprise’s original data and its backups, leaving no choice but to pay a ransom to recover the data.

KEYWORDS: emergency communications emergency management Emergency Preparedness risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ground Zero 9/11 terrorist attacks 20th anniversary

    The 20th anniversary of September 11: Reflections on the evolution of enterprise security

    See More
  • SEC0521-Covid-ADM_Feat-slide1_900px

    ADM unlocks the power of existing data for COVID-19 response

    See More
  • Sec Feat

    Critical infrastructure: The critical industry everyone must protect

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing