The hard line separating the clean spot where the computer used to sit from the rest of the dusty desk tells the victim of a commercial break-in all they need to know, at least when it comes to computers:
Once they are gone, they are gone for good.
After the shock and anger subside, most owners of small and medium-size businesses (SMBs) know what to do next.
The theft of computer hardware is not a simple or painless matter.
It’s a deep violation of the ideas each of us holds about just how protected we are in spaces we assume are safe—like our offices. However, despite the intrusive and wrong nature of the theft, the logistical problems associated with stolen computers are relatively easy to solve.
The data on the stolen computers is another matter.
Chances are, when the thief pulled the stocking mask over his face, broke the lock on the front door, and strolled past the surveillance cameras—as though he owned the place—he was never looking for computers.
Unless your business happens to be the CIA, your actual hardware is relatively worthless.
Or, if not worthless, hardware is certainly not worth the risk of spending the next 5 to 10 years wearing all orange and speaking to your children through a glass divider.
But you know what might be worth the risk?
The information on the hard drive.
Customer data. Credit card numbers. Corporate secrets.
The good stuff.
If you’re a commercial security company, there is a very good chance that your customer’s facility contains personally identifiable information (PII) strewn literally all over the place.
In the computers on the desks.
In the filing cabinets against the wall.
In the trash and recycling bins near the water cooler.
(Yes, even in 2019—and if that describes anyone reading this, please ask the team here at CSR Privacy Solutions for a referral to one of our many channel partners who focus on destroying your documents in a morally ethical and legally compliant manner.)
Let’s be clear: PII strewn all over the place is not a proper approach to secure data storage or privacy protection. We consider ourselves privacy experts—but it doesn’t take an expert to know that keeping customer credit card numbers or social security information on the hard drive of easily stolen computers is neither morally ethical nor legally compliant.
Unfortunately, for many SMBs, it’s the only approach to data and privacy they know.
And it’s a ticking time bomb.
A data breach is a data breach.
It doesn’t matter how consumer PII gets into the wrong hands—it just matters that it does.
And that’s when the break-in can go from a relatively minor inconvenience to every nail in an SMB’s coffin. As penalties and fines continue to escalate for illegal and improper data handling, stolen computers can quickly transition from evidence of victimhood to evidence of negligence or even criminality on the part of the SMB’s owners and managers.
That’s the bad news.
The good news is that alarm and security companies have a unique opportunity to differentiate themselves in the market by protecting SMBs from the consequences of a break-in that leads to a data breach.
By partnering with CSR Privacy Solutions.
Our Readiness Pro is a comprehensive system of protection specifically designed to address the needs of SMBs. Designed by the world’s most recognized data- and privacy-protection thought leaders and experts, Readiness Pro combines a proactive approach to creating legally compliant data and privacy policies and procedures and reactive steps that take effect the moment the SMB reports a data breach.
Becoming a channel partner with CSR Privacy Solutions gives alarm and security companies the opportunity to add value to their customers and increase their recurring monthly revenue (RMR).
More than anything, though, a partnership with CSR means alarm and security companies can deliver exactly what they promise customers:
Peace of mind, and real protection from the devastating consequences of a data breach.