June 12th, 2024
Contributor: Anagha Anilkumar, Filip Dimitrov, Anup Narayanan
Personally identifiable information (PII) is any data that can be used to identify an individual, either on its own or when combined with other information. This includes names, addresses, Social Security numbers, email addresses, phone numbers, and other data that can be linked to a specific person.
Organizations have a legal and ethical obligation to protect PII, as its exposure can have severe consequences for affected individuals, such as identity theft or financial loss. The organization itself will also face serious repercussions, such as regulatory fines and a negative impact on its reputation.
This article aims to prepare organizations for handling personally identifiable information in seven steps:
Modern organizations handle a lot of data. To protect it, you must first be able to identify and classify it based on its sensitivity. PII, such as names, credit card and social security numbers, and addresses, is highly sensitive and requires strong protection.
So, before we start implementing the appropriate security measures, the first step is to determine the security level required for each piece of information. Once the data is classified, it’s much easier to protect as we will know the criticality of each type of data and can allocate our efforts accordingly.
Once data is classified, it’s time to implement security measures. The first one that comes to mind is limiting access to sensitive data via strict access controls. Access should be granted on a need-to-know basis, with strong verification and authentication measures to ensure only authorized users can access PII.
Two concepts you should be familiar with regarding access control are the principle of least privilege and role-based access control (RBAC).
Least privilege is a security concept in which users are granted the minimum access necessary to perform their job functions. RBAC is part of least privilege, where you define roles within the organization and assign permissions based on these roles. This ensures that users only have access to the data and systems required for their specific job responsibilities.
Data encryption is the process of converting data into an unreadable format to make it inaccessible to unauthorized users. Encryption helps protect PII, both at rest and in transit. Several encryption methods are available. To ensure high security, it’s best to choose a robust encryption algorithm, such as the Advanced Encryption Standard (AES) with 256-bit keys.
Encrypting data takes time and storage, so it’s best to do it after classifying your data and identifying the PII that’s most critical to protect.
Where and how you store data has huge implications for its security. Inadequate storage can leave sensitive information vulnerable to breaches, while improper disposal can lead to data being retrieved and exploited by malicious actors. Here are some pointers:
Proper disposal procedures are also necessary once you no longer need some PII.
When PII in paper form is no longer needed, shred the documents using a cross-cut or micro-cut shredder. When it comes to electronic data, you can use data-wiping software or hardware-based methods to securely erase data from hard drives, USB drives, and other storage devices.
Employee training and awareness play a critical role in protecting personally identifiable information, as employees handle this data on a daily basis. Proper training ensures that employees understand the importance of PII protection and are equipped with the knowledge and skills to handle it securely.
Here are some essential topics to cover in PII handling training:
Security breaches happen all the time, even to organizations with robust cyber security programs. Your PII protection efforts should also include an incident response plan and breach notification procedures to detect, investigate, and mitigate breaches involving PII promptly.
An effective incident response plan has several components:
Cyber Security is an ongoing process. The personally identifiable information you handle will change over time, and so will regulations and best practices for protecting it. Staying informed and adapting to these changes is crucial for maintaining the security of your sensitive data.
You should also continuously monitor and audit the state of your PII practices. There are several tools that can help in that process:
With these tools, you can review access and transfer logs for your sensitive data and identify potential misuse or weak points in your PII handling practices.
Protecting personally identifiable information (PII) is essential for an organization’s security and integrity. It requires a comprehensive and proactive approach that can adapt to changing regulations, threats, and best practices. The need to protect PII is a shared responsibility among all employees and requires ongoing vigilance and commitment.
Book a Demo
Get a guided demo of our courses, anti-phishing training, behavior assessments and managed services.