It doesn't matter what type of company you run, your operation amasses a great deal of valuable data. You have a treasure trove of customer information, including phone numbers, mailing addresses, email addresses, billing histories, demographic profiles, social security numbers, bank account numbers and credit card numbers. You purchased some of this data, while you collected the rest over time, using meticulous recording keeping.

Even the smallest of businesses possesses an extraordinary amount of priceless information, but as a small-business owner, what are you doing with it? Learn more in this issue of Promotional Consultant Today.

First and foremost, it's important to protect your data. With the theft of personal information steadily increasing due to an insatiable demand and relatively low risk there is a greater likelihood your business could soon be a victim and you could be at risk. It's also important for you to protect one of your organization's most valuable assets.

First, you need someone with the knowledge and experience to be in charge of securing your computers, network, intranet and internet access points.

Then, give that person the resources needed to do the job. I'm not suggesting you provide an unlimited budget or a blank check, but when they say it will cost X dollars to do the job, don't provide half that amount and expect full results. If you cut the funds to protect your data, some items will remain insecure or be only partially secure. That would be akin to locking the doors of your office, but leaving the windows open, or installing a building security system, but never connecting it to the monitoring station. Don't handcuff the crime stoppers.

Next, know that many security breaches are inside jobs. Yes, I realize you carefully screen new hires and trust your employees to not steal from you. I'd be disappointed if you didn't hold your staff in high esteem. However, the reality is that many cases of data theft involve an insider, be it complicit or innocently duped.

To address the people side of the equation, you need your human resources department involved, along with IT and your security officer. Together they can put safeguards in place to restrict access, limit the scope of information available and provide an electronic log of activity. Additionally, provide training on what information staff can give out and under what conditions.

Your data—and your company's future—is on the line. Make sure it's a secure one.

Source: Peter DeHaan is a magazine publisher by day and a writer by night.