#CIOChat

End-user training strategy and customer compliance: Tweet jammers talk

Data and information security is a top-of-mind concern in every aspect of a business, whether you're dealing with corporate, employee or customer-facing data. As the quantity of information generated increases, so does the need to protect sensitive information from destructive forces and unwanted actions by unauthorized users.

In this month's

    Requires Free Membership to View

SearchCIO-Midmarket tweet jam, we wanted to know where our followers are focusing their security efforts and what kinds of threats they consider imminent. We started by asking:

There was no argument: Our tweet jammers answered with a resounding, "All data!"

In terms of data security, where there are customers, there are looming compliance issues. At least that's how SearchCIO senior features writer Karen Goulart sees it:

 

Encouraging some level of customer compliance is one way to protect customer data, but what happens when customers' purchasing records and other such information is shared unbeknownst to the customer? On this point, a "Big Brother" conversation spun out, focusing on retailer Target's infamous pregnancy scandal:

 

After discussing the importance of protecting customers' personal data, our tweet jam participants moved on to the topic of end-user cybersecurity training:

Cybersecurity priorities encompass application security, network security, disaster recovery and, perhaps most important, end-user education. Here are tweet jammers' suggestions for training users:

Tell us: Do you have any cybersecurity horror stories? Is your company focusing more attention on an end-user training strategy or customer compliance? Share your thoughts in the comment section below.

And while you're at it, follow @CIOMidmarket and @SearchCIO on Twitter. To view the entire conversation from our data security tweet jam, search #CIOChat on Twitter.

This was first published in July 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.