<p>What&#39;s in your phone? Every time you slip that device out of its holster - even if its just for a quick game of Candy Crush - you&#39;re holding a storehouse of personal information, and most likely, an access point into your company network.</p><p>We&#39;ve gotten so addicted to those handheld devices, but, along with the added convenience and productivity, they&#39;ve also blessed us with some heightened security risks.</p><p>A strong password policy may be inconvenient, but it&#39;s nowhere near as inconvenient as a data breach or a network crash. Here is a simple, three step method for creating passwords.Once you create that killer password, you&#39;ll also find three rules for keeping it safe.</p><p>Do you have enforceable and up-to-date <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/dont-ignore-key-control-394599" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">key control policies</a>? With so much attention paid to high tech threats, it’s easy to forget that those little metal keys can make you pretty vulnerable, too.</p><p>Think about how many doors in your facility are accessed via mechanical keys. Do your entry doors require only a key to open? What about file or server rooms? Do you have expensive inventory or supplies protected by lock and key?</p><p>Mechanical keys tell no tales. If inventory or supplies go missing, you may have no way to determine who unlocked the door.</p><p>Before you toss out that old computer or copy machine, make sure that you erase the hard drive completely. A trashed computer is a gold mine for identity and data thieves. And many users still do not realize that their office copier stores documents on a hard drive until the files are overwritten. So unless you take the proper steps to ensure that all data has been erased from a computer or copier before it leaves your office, you may be opening the door to a security breach</p><p>Email and social networking have created their own category of security concerns. These technologies make it very simple to disseminate information. And once that information leaves your building, it can rarely, if ever, be recalled. Your email policy should address appropriate content for company emails and social media pages. Assume that nothing will stay private on the internet.</p><p>Here is a <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/blogging-and-social-media-policy-sample-1918884" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">sample social media policy</a> that you can use as a guide for writing your own customized document.</p><p>A deadbolt is a physical security standard for protecting exterior doors. Properly installed, a deadbolt will guard your doors from attack by even the most determined intruder. Here is a list of features to consider when <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/how-to-choose-a-deadbolt-lock-394595" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">selecting a deadbolt</a> for your business.</p><p>A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events such as motion in a room, decides if the event poses a threat, and then acts on that decision. While a security system for your business isn&#39;t a do-it-yourself affair, you should understand the language of security in order to communicate your needs to a security professional, understand any proposals you may receive, and make the most of your security system after it is installed.</p><p>This introduction to security systems takes the sense-decide-act process as an outline and describe the electronic hardware that performs each function.</p><p>Security cameras are used for two basic purposes: investigation and deterrence. The images that you collect with your security cameras will most often be used to review a crime or accident so that you can understand what really happened. But the cameras themselves also have a deterrent value since people who know they are being watched are usually on their best behavior.</p><p>In order to realize maximum investigative and deterrent value from your cameras, you need to carefully choose where you place them. Here are the <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/the-4-best-locations-for-your-security-cameras-394600" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">4 best locations to install your security cameras</a>.</p><p>An unauthorized or unescorted visitor can be a physical threat and can also steal sensitive information. If possible, steer all visitors into a controlled entry point, be it a gate or receptionist’s desk. When writing your policy, decide whether visitors should be escorted at all times, or only in certain areas. Requiring visitors to wear a badge and sign in and out should also be considered. If your visitor management policy is communicated clearly, employees can more easily serve as your eyes and ears as they will feel more comfortable approaching or reporting a suspicious individual.</p><p>Here is a <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/sample-visitor-access-policy-394500" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">sample visitor management</a> policy that you can use as a guide when writing a customized document for your own business.</p><p>In a large company, it&#39;s nearly impossible to recognize every vendor, contractor, and new employee. Not only that, but most folks will not take the initiative to question someone they do not recognize. Intruders know this, and exploiting a lax or non-existent <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/sample-visitor-access-policy-394500" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">Visitor Management Policy</a> is one way that they can gain access to a facility, steal information or property, or cause physical harm. <a href="http://web.archive.org./web/20161031133332/https://www.thebalance.com/sample-visitor-access-policy-394500" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="2">Assigning a Floor Marshall</a> is a simple and effective way to help protect your business against such intruders.</p>