Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Data security is critical to your organization’s reputation strategy

By Michael V. Borromeo
data-security-freepik1170.jpg
December 16, 2021

A company’s ability to keep data safe can directly affect whether customers trust the organization and remain loyal over time. According to Shred-it’s 2021 Data Protection Report, more than 8 out of 10 consumers decide which companies to do business with based on their reputation for information security. In part, this is because consumers feel less confident about the security of their personal data than they did a decade ago — and they have reason to feel this way. Nearly 70% of consumers surveyed have been personally impacted by a data breach in 2021 as compared to 53% in 2020. 

Unfortunately, consumers tend to have low confidence when it comes to businesses and data security. One in three consumers believe that companies fall short in terms of timely, transparent communications around data leaks, and there is a general perception that these incidents only come to light when the company gets caught or is forced to reveal the event. 

Trust can quickly erode if an organization experiences a breach but does not manage it well. Although consumers may wait and see how a company reacts to the security lapse before making any decisions about their future relationship with the organization, people may choose to sever ties — especially if they feel the organization was not transparent and appropriately responsive. Nearly 1 in 4 consumers will stop doing business with a company if their personal information is compromised. 

When customers lose faith and take their business elsewhere, there can be serious implications for a company’s bottom line. Given all this, what can businesses do to protect themselves? Here are a few strategies to consider. 

 

Stay Informed on Consumer Privacy Legislation 

Over the last decade, data protection laws and regulations have evolved to deter criminals and compel businesses to improve their security and privacy efforts. Spending time understanding the current regulatory landscape is critical to not only meet existing requirements, but also prepare for what’s on the horizon. 

Historically, the United States has taken a sectoral approach to consumer privacy and data protection legislation with laws such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare and Gramm-Leach-Bliley Act (GLBA) for financial services, and the Family Educational Rights and Privacy Act (FERPA) for education. To provide protection for all consumers, several states, including California, Colorado, and Virginia, have passed comprehensive data privacy legislation that governs how companies must safeguard consumers’ personal information and preserve an individual’s privacy.  

Globally, many countries already have wide-reaching privacy legislation, including Canada, the UK, and the European Union. If a company operates internationally, it should be cognizant of these requirements as well, as countries continue to pass new or update existing legislation with regularity. 

Develop Comprehensive Data Protection Strategies that Cover All Data

The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both). 

Risks to electronic data include compromise or loss due to malware, phishing, theft, or human error. Physical risks can be similar and result from theft of paper documents or equipment that houses confidential information, such as laptops, external storage media, cell phones, etc. Once a company knows what kinds of data it has and the risks that threaten that data, it can determine the appropriate combination of safeguards and controls. 

To protect physical data, businesses should consider utilizing a document destruction service at regular intervals to pick up and securely destroy confidential information that is no longer needed. Similarly, it may want to employ a process for collecting and destroying legacy hard drives or laptops that are not in use. 

To protect electronic data, the company will need a strong cybersecurity program that covers technology, business processes, and, of course, the people that use them. To that end, it’s important to supplement training with practice, such as phishing simulations, which help employees to better recognize threats and build “muscle memory” for avoiding and reporting them. Today’s data thieves are far more sophisticated and are constantly evolving. For this reason, it’s essential to ensure all employees fully understand their roles and responsibilities for protecting the company’s data assets.

 

Ensure Employees Keep Data Safe Wherever They Are

Given the current hybrid work environment, it is particularly important to ensure staff have access to the tools they need to maintain data security when they are working remotely — whether that’s in a home office or public setting. Implementing data protection strategies such a requiring the use of virtual private networks (VPNs) and multi-factor authentication can reduce the risk of compromise or theft, no matter where an employee logs in. From a physical security perspective, consider training employees that work remotely to securely store documents in a locked cabinet or other secure location until they can bring them back to the office to be placed in secure bins to be destroyed. 

Data security is a key element in customer retention, and businesses should take a multifaceted approach to safeguard information. By paying attention to both physical and digital risks and implementing strategies to reduce them, a company can avoid costly breaches that could have ramifications for years to come. 

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike borromeo headshot 400x400px

Michael V. Borromeo has over 20 years of broad and diversified experience in the fields of Privacy and Cybersecurity. He has designed Privacy strategies and implemented compliance programs, which include creating and/or enhancing IT and business processes, developing policies and standards, and employing technology solutions. Michael has a depth of knowledge and skill in the areas of information governance, policy and regulatory compliance, information security strategy and architecture, and IT security risk management.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • communications-freepik1170x658.jpg

    Now is the time to prioritize your organization’s security communications strategy

    See More
  • email security

    Why outbound email is your organization's biggest security risk

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing