Data Privacy


 
Data breaches involving the theft, mishandling, or unauthorized access of personal, medical and financial information continue to increase and impact tens of millions of Americans every year.
 

 
 
adult-desk-digital-nomad-1181681.jpg

Guidelines for Individuals

 
 
 

  • Conduct an audit of all online accounts that contain personal information; delete any that are no longer necessary

  • Enable two-factor authentication (2FA) on all online accounts and mobile apps that offer it

  • If your social media contains personal information and photos, restrict settings to avoid public posts

  • Secure your home WiFi by requiring a strong password to access the network


  • Change default admin passwords on connected devices such as cameras, thermostats, and appliances

  • Never respond to unsolicited emails or phone calls requesting your personal, medical, or financial information

  • Enable full disk encryption on personal computers, if available

  • Never make purchases or enter sensitive information on websites that do not display 'HTTPS' in the address

 
 

 
 
 

Guidelines for Businesses

 
 
 

  • Collect the minimum amount of sensitive personally identifiable information (PII) and retain for only as long as necessary

  • Conduct an audit of all systems for sensitive PII; delete any for which there is no reason to retain

  • Implement policies and train employees on the proper methods to safeguard data

  • Embrace the principle of least privilege and the separation of duties


  • Encrypt sensitive data in transit and at rest

  • Require multi-factor authentication for remote access into the corporate network and privileged access to systems

  • Ensure all software and hardware is maintained at vendor supported patch levels

  • Segregate networks containing systems that process or store sensitive data from other corporate networks

  • Implement protective technologies including web and email filtering, endpoint protection, and application whitelisting

 
 

 
 

Additional NJCCIC Resources

Best Practices: Learn all about cybersecurity best practices on email security, passwords and multi-factor authentication, exploring the internet, and device security.

Be Sure to Secure: Discover information on various cybersecurity topics as well as instructional guides designed to teach you how to properly secure devices, data, and networks.

Threat Analysis: Catch up on the latest cyber threats!