• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • LOGIN
  • Law Office ManagerHOME
  • Book StoreBook Store
  • WebinarsWebinars
  • LOGIN
  • Manage Your Account
  •  
Law Office Manager

Law Office Manager

  • Hiring
  • Increasing profits
  • Technology
  • Billing
  • Managing staff
  • More! ⇩
    • Newsletter Archive
    • Time tracking
    • Client relations
    • Termination
    • Tool Box
    • Risk management
    • Recordkeeping
    • Cartoons
    • Reader tips
    • Purchasing & leasing
    • Marketing
    • Managing the office
    • Information security
    • Your career
    • Working with lawyers
    • Employee benefits
    • Compliance
    • Workplace Safety
  • Special Reports

Follow these 7 guidelines to protect your firm’s digital data

June 3, 2016

According to a recent study, American business leaders are unprepared for the increased threat to information security that comes with flexible office environments.

The 2016 Shred-it Security Tracker information security survey shows that leaders are not providing the protocols and training needed to ensure customer and competitive information remains secure in a mobile work environment.

With the number of mobile workers in the US expected to reach 105 million by 2020, more workers are using the tools of the modern workforce, including laptops, USBs, and cloud storage to connect outside the traditional office environment.

The 2016 Security Tracker shows that the majority of C-Suite Executives (92%) and just over half of small business owners (SBOs) (58%) have at least some employees using a flexible/offsite working model. Yet, only 31% of C-Suite Executives and 32% of SBOs said they have an information security policy for both off-site work environments and flexible working areas in place. 

“Without ongoing training and comprehensive policies for remote and flexible workplaces, businesses are at risk,” says Andrew Lenardon, Global Director, Shred-it. “Although employees want increased flexibility and the ability to work remotely, business leaders must ensure that the right information security and training protocols are in-place to protect confidential customer and business data.”

How are you storing and destroying your digital data?

Policies and procedures governing the secure storage and destruction of mobile devices are essential in an organization’s information security policy. While larger U.S. organizations have incorporated this as part of their overall efforts, small businesses have room to improve how they are destroying and storing digital data.

SBOs are more likely to wipe/degauss electronic devices in-house (37%), risking inadvertently exposing the confidential data stored on the hard drive when the device is sent to be recycled or reused. In contrast, their C-Suite counterparts follow the best practices for data destruction and almost half (47%) use a professional destruction service to dispose of their unneeded electronic material.  

Regularly destroying hardware is another important part of device management, as legacy hardware stockpiled and stored in the office is a risk for theft. However, 60% of SBOs only dispose of hard drives, USBs, and other electronic devices containing confidential information less than once a year or never. Comparatively, a majority of C-Suite Executives (76%) indicate their businesses destroy hardware every two to three months—or more frequently.

“The only proper way to protect information is to physically destroy the hard drive—simply wiping the device does not ensure sensitive information is completely removed,” says Lenardon. “Implementing security policies that address how digital devices are stored and destroyed is vital for any sized organization to help address the additional risks associated with mobile working.”

While C-Suite Executives are focused on electronic device and data destruction, they must not become complacent with the storage and destruction of paper documents as their employees are no longer tied to the traditional office. Approximately 46% of C-Suite Executives report having a protocol for destroying confidential documents adhered to by all employees— a dramatic drop from 2015 where 63% of C-Suite Executives reported having a protocol in place adhered to by all employees.

7 data protection guidelines

To help businesses of all sizes ensure their corporate policies and training around data protection and security keep pace with the evolving work environment, Shred-it suggests these seven simple workplace guidelines:

  1. Remind employees not to leave hardware or materials in vehicles, hotels, coffee shops, or elsewhere.
  1. Limit the type of documents that employees can remove from the office, as there is no way to ensure data is secured when outside of the company’s control
  1. Encrypt all phones and hard drives, and activate passwords on electronic devices.
  1. Perform a regular cleaning of storage facilities and avoid stockpiling obsolete electronic devices
  1. Destroy all unused hard drives using a third-party provider who has a secure chain of custody and confirms destruction.
  1. Regularly review your organization’s information security policy to incorporate new and emerging forms of electronic media.
  1. Schedule on-going training so employees understand best practices for protecting confidential information—in and out of the workplace.

Conclusion

As workforces become more mobile, C-Suite Executives and Small Business owners face similar challenges when it comes to protecting sensitive data. To mitigate the increased risk of an increasingly mobile workforce, businesses of all sizes must be proactive in introducing protocols and training to keep employee, customer and company data safe.


Editor’s picks:

The War Against Data Breaches: What Law Firms Need to Know
#


Report: Cybersecurity breaches hit nearly three in four organizations#


How to protect your data against costly and destructive cyber attack#


Filed Under: Topics, Information security, Risk management, Technology, articles Tagged With: Information security, Technology, Risk management

Primary Sidebar

Free Reports

    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying

Free Premium Reports

    • 7 Smart Cost-Cutting Strategies for Your Law Office
    • Guide to Advanced Hiring Techniques
    • Employee Morale in the Law Office
    • Workplace Bullying
    • 7 Proven Ways to Make Your Billing and Collections More Profitable
    • 7 Simple, Proven Steps to Hiring the Right Staff
    • 7 Policies Every Law Office Should Have

Download Current Issue

Current Issue

Recent Headlines

Why “Thank You” Matters More Than You Think

7 Ways to Manage the Midnight Pings

17 Productivity Tips for Law Office Managers

Taking Care of Yourself as the Work Pace Ramps Up

Case Management Audit Checklist

Your Career

Why “Thank You” Matters More Than You Think

7 Ways to Manage the Midnight Pings

17 Productivity Tips for Law Office Managers

Taking Care of Yourself as the Work Pace Ramps Up

Year-End Reflections: Taking Stock of Your Law Office’s Successes and Challenges

Deliver Your Message

Footer

Return to the Top

Download the Current issue
Monthly Magazine Archive
Advertise in Law Office Manager
Download Media Kit

Become a Premium Member
Download a Sample Issue of LOM
Renew your Law Office Manager Membership
Manage Your Account
Contact Law Office Manager
About Law Office Manager
Terms & Conditions
Privacy Policy
Give Us Feedback


Copyright © 2025 Plain Language Media, LLLP • 1-888-729-2315