Skip to Main Content

Have You Mapped Your Data Lately?

The text "Cybersecurity Tip of the Week"

Mapping how data in your organization is received, processed, disseminated, and stored is critical to designing appropriate protections. In order to conduct cyber risk assessments and to mitigate cyber incidents, you have to know how data flows and what specific pieces of data require extra protection due to statutory privacy and data protection laws.

Internal Controls include data privacy and robust cybersecurity controls to not only protect data but ensure that operations and systems are not disrupted due to a cyber incident. Here is a simple set of questions to assist with mapping out your data lifecycle in your organization.

Data Lifecycle Management

See our Cyber Center for additional resources and links for cyber alerts, and contact [email protected] with any incidents or suspected incidents of fraud or cyber-attacks.