{"id":153353,"date":"2016-12-15T14:19:00","date_gmt":"2016-12-15T19:19:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/"},"modified":"2016-12-15T14:19:00","modified_gmt":"2016-12-15T19:19:00","slug":"weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","title":{"rendered":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information"},"content":{"rendered":"

Establish policies on how employees should handle and protect personally identifiable information and other sensitive data.  Clearly outline the consequences of violating your business’s cybersecurity policies.<\/p>\n

\"IT<\/p>\n","protected":false},"excerpt":{"rendered":"

Establish policies on how employees should handle and protect personally identifiable information and other sensitive data.  Clearly outline the consequences of violating your business’s cybersecurity policies.<\/p>\n","protected":false},"author":5,"featured_media":153355,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-153353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nWeekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia\" \/>\n<meta property=\"og:description\" content=\"Establish policies on how employees should handle and protect personally identifiable information and other sensitive data.  Clearly outline the consequences of violating your business’s cybersecurity policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Services in Virginia\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-15T19:19:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536.jpg\" \/>\n<meta name=\"author\" content=\"Steve West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve West\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/\",\"url\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/\",\"name\":\"Weekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia\",\"isPartOf\":{\"@id\":\"https:\/\/www.ntegrait.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg\",\"datePublished\":\"2016-12-15T19:19:00+00:00\",\"dateModified\":\"2016-12-15T19:19:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage\",\"url\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg\",\"contentUrl\":\"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg\",\"width\":1024,\"height\":536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ntegrait.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weekly Tech Tip: Establish security practices and policies to protect sensitive information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ntegrait.com\/#website\",\"url\":\"https:\/\/www.ntegrait.com\/\",\"name\":\"IT Services in Virginia\",\"description\":\"Ntegra IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ntegrait.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79\",\"name\":\"Steve West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g\",\"caption\":\"Steve West\"},\"description\":\"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.\",\"url\":\"https:\/\/ntegrait.com\/author\/swestntegrait-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia","og_description":"Establish policies on how employees should handle and protect personally identifiable information and other sensitive data.  Clearly outline the consequences of violating your business’s cybersecurity policies.","og_url":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","og_site_name":"IT Services in Virginia","article_published_time":"2016-12-15T19:19:00+00:00","og_image":[{"url":"https:\/\/blogfeed.ulistic-projects.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536.jpg","type":"","width":"","height":""}],"author":"Steve West","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve West"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","url":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","name":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information - IT Services in Virginia","isPartOf":{"@id":"https:\/\/www.ntegrait.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage"},"image":{"@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage"},"thumbnailUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg","datePublished":"2016-12-15T19:19:00+00:00","dateModified":"2016-12-15T19:19:00+00:00","author":{"@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79"},"breadcrumb":{"@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#primaryimage","url":"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg","contentUrl":"https:\/\/ntegrait.com\/wp-content\/uploads\/2016\/12\/FB_ad_image_tip3-1024x536-2.jpg","width":1024,"height":536},{"@type":"BreadcrumbList","@id":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ntegrait.com\/"},{"@type":"ListItem","position":2,"name":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information"}]},{"@type":"WebSite","@id":"https:\/\/www.ntegrait.com\/#website","url":"https:\/\/www.ntegrait.com\/","name":"IT Services in Virginia","description":"Ntegra IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ntegrait.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/33156c118f002b88019c3fc70441bf79","name":"Steve West","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ntegrait.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3cc273f166c78aca895198956663df42?s=96&d=mm&r=g","caption":"Steve West"},"description":"Ntegra IT is devoted to providing reliable Computer Support to businesses that want to improve productivity and profitability. We deliver custom designed Network Services that better map to your business, so you can stop worrying about your technology and get back to achieving your business goals.","url":"https:\/\/ntegrait.com\/author\/swestntegrait-com\/"}]}},"_links":{"self":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/153353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/comments?post=153353"}],"version-history":[{"count":0,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/posts\/153353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media\/153355"}],"wp:attachment":[{"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/media?parent=153353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/categories?post=153353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ntegrait.com\/wp-json\/wp\/v2\/tags?post=153353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}