Do You Have a Habit of Security?

“The unfortunate thing about this world is that good habits are so much easier to give up than bad ones.”  ~ Somerset Maugham

We all have habits that put the security of our Private Personal Information (PPI) at risk. At work our bad habits put our customers and fellow employees at risk.

We throw mail that has our PPI into the trash rather than shredding it. We give our credit card to the waiter after a great meal. We leave the I9 folder on our desk while at lunch. We give our child’s Social Security number and birth date to the Little League and day care. We use the same weak password for every online account.

Sadly we can do the correct thing 100 times, but it only takes one slip to let the ID Thief in the door. That’s where developing good habits that we do without thinking are the foundation of building and maintaining a successful Culture of Security.

“Habit is habit, and not to be flung out of the window by any man, but coaxed downstairs a step at a time.”  ~ Mark Twain

Zenhabits breathe has great tips, techniques and quotes for building good habits.

The Secret Rule of Changing Anything: When you are aware, you can change it.

“Motivation is what gets you started. Habit is what keeps you going.” ~ Jim Ryun

Each bad habit started one step at a time. You cannot stop the impetus of a bad habit. You can only replace it with a good habit one step at a time.

Begin today building a habit of keeping Private Personal Information secure.

Advertisements

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Identity Theft Protection, Security Culture and tagged , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s