{"id":6557,"date":"2013-05-22T15:59:13","date_gmt":"2013-05-22T15:59:13","guid":{"rendered":"https:\/\/delandgibson.com\/?p=6557"},"modified":"2021-07-22T17:58:15","modified_gmt":"2021-07-22T17:58:15","slug":"internal-data-security","status":"publish","type":"post","link":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/","title":{"rendered":"Internal Data Security"},"content":{"rendered":"

 <\/p>\n

A firm is more likely to have an internal data breach versus an external breach. This is counter-intuitive due to the media\u2019s sensationalism of hackers and their conquests but the likelihood of an issue comes from the people that have access to your offices.<\/p>\n

Real Scenarios<\/strong>:<\/p>\n

An Accounting Firm<\/em><\/span> \u2013 The cleaning service accidentally leaves the door unlocked and hard copy tax returns are stolen.<\/p>\n

An Asset Manager<\/em> <\/span>\u2013 A disgruntled employee steals client information with a flash drive before being terminated.<\/p>\n

A Doctors Office<\/em><\/span> \u2013 A copy machine is returned to the warehouse after the lease was renewed and the old machine was replaced with a new one. The Hard Drive was later stolen from the machine in the warehouse with 2 Gigabytes of patient information.<\/p>\n

To quantify the costs of a breach, click on this link for a calculator. If you have over 1,000 files this link can be a help to determine what the cost to your organization could be: Calculator<\/a><\/p>\n

With only an insurance policy you have not positioned your firm to properly manage these risks. The proper steps should be to complete a risk analysis, followed by a risk reduction plan to set up methods to transfer, mitigate, prevent, finance or assume the risk. New risks are emerging by the day so it is extremely important for firms to proactively position themselves for what could happen next.<\/p>\n

For more information and to utilize some of Deland, Gibson\u2019s proprietary risk management services please email Chip Gibson<\/a> or call him at 781.237.1515.<\/p>\n","protected":false},"excerpt":{"rendered":"

  A firm is more likely to have an internal data breach versus an external breach. This is counter-intuitive due to the media\u2019s sensationalism of hackers and their conquests but … <\/p>\n

Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[280],"tags":[270],"yoast_head":"\nInternal Data Security - Deland, Gibson Insurance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internal Data Security - Deland, Gibson Insurance\" \/>\n<meta property=\"og:description\" content=\"  A firm is more likely to have an internal data breach versus an external breach. This is counter-intuitive due to the media\u2019s sensationalism of hackers and their conquests but ... Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Deland, Gibson Insurance\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-22T15:59:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-22T17:58:15+00:00\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/\",\"url\":\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/\",\"name\":\"Internal Data Security - Deland, Gibson Insurance\",\"isPartOf\":{\"@id\":\"https:\/\/delandgibson.com\/#website\"},\"datePublished\":\"2013-05-22T15:59:13+00:00\",\"dateModified\":\"2021-07-22T17:58:15+00:00\",\"author\":{\"@id\":\"https:\/\/delandgibson.com\/#\/schema\/person\/70a9741c305f048bd0d382d3e21b7bcd\"},\"breadcrumb\":{\"@id\":\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/delandgibson.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internal Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/delandgibson.com\/#website\",\"url\":\"https:\/\/delandgibson.com\/\",\"name\":\"Deland, Gibson Insurance\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/delandgibson.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/delandgibson.com\/#\/schema\/person\/70a9741c305f048bd0d382d3e21b7bcd\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/delandgibson.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/87854efad150443ba384f7616778367a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/87854efad150443ba384f7616778367a?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\/\/delandgibson.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internal Data Security - Deland, Gibson Insurance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Internal Data Security - Deland, Gibson Insurance","og_description":"  A firm is more likely to have an internal data breach versus an external breach. This is counter-intuitive due to the media\u2019s sensationalism of hackers and their conquests but ... Read More","og_url":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/","og_site_name":"Deland, Gibson Insurance","article_published_time":"2013-05-22T15:59:13+00:00","article_modified_time":"2021-07-22T17:58:15+00:00","author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/","url":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/","name":"Internal Data Security - Deland, Gibson Insurance","isPartOf":{"@id":"https:\/\/delandgibson.com\/#website"},"datePublished":"2013-05-22T15:59:13+00:00","dateModified":"2021-07-22T17:58:15+00:00","author":{"@id":"https:\/\/delandgibson.com\/#\/schema\/person\/70a9741c305f048bd0d382d3e21b7bcd"},"breadcrumb":{"@id":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/delandgibson.com\/blog\/2013\/05\/22\/internal-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/delandgibson.com\/"},{"@type":"ListItem","position":2,"name":"Internal Data Security"}]},{"@type":"WebSite","@id":"https:\/\/delandgibson.com\/#website","url":"https:\/\/delandgibson.com\/","name":"Deland, Gibson Insurance","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/delandgibson.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/delandgibson.com\/#\/schema\/person\/70a9741c305f048bd0d382d3e21b7bcd","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/delandgibson.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/87854efad150443ba384f7616778367a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87854efad150443ba384f7616778367a?s=96&d=mm&r=g","caption":"Admin"},"url":"https:\/\/delandgibson.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/posts\/6557"}],"collection":[{"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/comments?post=6557"}],"version-history":[{"count":0,"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/posts\/6557\/revisions"}],"wp:attachment":[{"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/media?parent=6557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/categories?post=6557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/delandgibson.com\/wp-json\/wp\/v2\/tags?post=6557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}