Handle Sensitive Information at Work
Handle Sensitive Information at Work
Overview
Every company holds information that needs protection: customer details, employee records, financial data, contracts, and internal plans. This article gives you the everyday habits for handling that information without putting it at risk.
Before You Begin
- Locate your company's data classification policy if one exists. It defines what counts as public, internal, confidential, or restricted.
- Know the systems your company has approved for storing each level of data.
- Recognize the most common sensitive items in your role: customer PII, account numbers, health data, financial records, or source code.
Steps
- Classify before you share. Pause for two seconds and ask whether the information is public, internal, confidential, or restricted. Treat the email or chat the same way.
- Use approved tools. Confidential data belongs in your company's file share, document system, or CRM. Personal email, consumer chat apps, and unmanaged cloud drives are not approved.
- Share only with people who need it. The "minimum necessary" rule applies even when no regulation requires it. Fewer eyes equals less risk.
- Encrypt when you send sensitive data outside the company. Your administrator can show you the encryption option in your email client.
- Use the right permissions on shared links. Default to People in my organization or specific named recipients. Avoid Anyone with the link unless the content is truly public.
- Print only when necessary. Pick up the printout the same minute. Shred when finished.
- Lock your screen any time you step away. Sensitive data on an unattended monitor is one of the most common audit findings.
- Dispose of devices through your IT team. Hard drives, phones, and printers can hold years of sensitive data. Never sell or recycle a work device on your own.
Troubleshooting
- If you sent confidential data to the wrong person: recall the email if your platform supports it, then notify your security team. Speed and honesty work in your favor.
- If a vendor asks for sensitive data through an unusual channel: confirm through a known channel before responding.
- If a coworker leaves sensitive material at the printer: drop it on their desk privately. A friendly nudge is more effective than a public correction.
- If you are unsure whether something is sensitive: treat it as confidential until you confirm otherwise.
Related Articles
Need More Help?
Submit a ticket at support.bostonmit.com or email support@bostonmit.com.
Related Articles
Handle USB Drives and Removable Media Safely
Handle USB Drives and Removable Media Safely Overview USB drives, external hard drives, and SD cards are small, but they can move malware or sensitive data faster than almost anything else. This article walks you through safe handling so an innocent ...
Browse the Web Safely at Work
Browse the Web Safely at Work Overview Most cyberattacks start with a web browser. A fake login page, a malicious ad, or a sketchy download can hand over your credentials in seconds. This article covers the safe-browsing habits that protect you and ...
Spot a Social Engineering Attempt
Spot a Social Engineering Attempt Overview Social engineering is when an attacker manipulates a person instead of hacking a computer. It works because humans are helpful, busy, and trust authority. This article gives you the patterns to spot and the ...
Stay Safe on Public Wi-Fi While Traveling
Stay Safe on Public Wi-Fi While Traveling Overview Airport lounges, coffee shops, and hotel lobbies all offer free Wi-Fi. They also offer attackers a front-row seat to whatever you do online. This article shows you how to keep working on the road ...