+1.877.796.2559 | Investors|

Your Quick-Start Guide to Protecting Applicant Data

Your Quick-Start Guide to Protecting Applicant Data

By ClearStar | Sep 8, 2016 | Company News, Employment Screening

If the phrase “cybersecurity breach” has you picturing a scene from a hacker movie, you’re not alone. While the threats to your job applicants’ data are very real, it can be hard to imagine them within your own company. Together with Paul de Naray, ClearStar’s Director of Cybersecurity, we created this list of the most commonly overlooked ways that companies put their cybersecurity at risk and how to fix it.

Unexpected Ways Security Can Be Breached

  • Authorized Access
    A system doesn’t have to be directly “hacked” in order to reach sensitive data. If the attacker is able to use phishing to collect user credentials, then he/she can gain access to applicant data through normal user access. If the attacker is able to apply for and gain a normal user account, then he/she will have authorized access to steal applicant
  • Threats Don’t Always Come From Outside of Y our Company
    A malicious employee may steal applicant data through an “insider attack”. In addition, human error and coding bugs are mistakes that can be just as damaging to your company as an external threat.

3 Easy Safeguards That Every Company Should C onsider

  • Train your employees on email security to self-detect malicious content
    Attackers use email attachments and links as primary methods to exploit an employee’s vulnerable system. Simply clicking a malicious link or a file with malware can put your entire company at risk.
  • Encrypt applicant data stored on any transportable device
    Laptops, external hard drives, and other removable media have a high likelihood of being stolen or lost when outside of the company. Encryption will deter an attacker from easily accessing the data.
  • Train your employees to detect social engineering attacks
    Well-crafted attacks will use social methods such as phone calls, emails, and in-person visits to gain access to your company and steal applicant data. Training will help employees spot these attacker methods and thwart their success.

How to Dispose of Background I nformation

All data that is no longer needed should be permanently destroyed in a physical or digital manner.  Physical destruction of paper includes using cross-cut/micro-cut shredders; or contracting with a secure document destruction company that delivers locked storage bins, schedules regular pickups, and destroys documents through incineration or other irrecoverable methods. Digital destruction includes secure deletion of data (by overwriting all deleted data) or physically destroying digital devices to prevent data recovery.

For more ways to protect your company’s data and security, work with a trusted background screening partner. Contact ClearStar today and we’ll help you get started!