We live in a connected world where we must share sensitive, identifying information regularly in exchange for services. If you’re accessing government or medical services, you’ll be sharing your PII (Personally Identifying Information). If you’re shopping, you’re sharing your credit card number. And so on! Safely transferring and storing sensitive data affects us all.
How you can you verify that you’re sharing and transferring sensitive data well? Follow these three steps:
- Verify the recipient. Don’t send to the wrong person!
- Verify the data. You don’t want to send the wrong data, even if it’s to the right person.
- Verify the method. Transfer data according to best practice or in line with your organization’s policies.