Everyday, corporations deal with confidential information containing everything from company trade secrets and marketing research and the social security numbers and addresses of employees, customers and vendors. Recent news headlines about dumpster diving and stolen laptops, however, have shown that the release of any kind of proprietary information can have disastrous consequences for businesses. In the last two years alone, 85 percent of businesses have experienced a data security breach involving the loss or theft of customer, consumer or employee data. In that same period of time, more than 150 million records have been exposed. The financial implications stemming from the theft of proprietary information in the workplace are startling, as the crime cost U.S. businesses and consumers $56.6 billion in 2005. On average, data losses cost companies $182 per compromised record in 2006, an increase of 31 percent from 2005. With an ongoing exchange of paper in offices, the workplace is an increasingly desirable target for identity thieves. Small businesses are particularly at risk because they don’t always have the resources to protect their information. Protecting your data is protecting your business — no matter how big or small the business, they all must ensure that the proper policies are in place to protect sensitive data. Ira Winkler, national security consultant and author of best-selling “Through the Eyes of the Enemy” and the recent “Zen and the Art of Information Security” suggests that businesses take the following precautions to help minimize their risk of identity theft: Shred ALL proprietary information with a deskside or commercial confetti-cut shredder. Work with your company IT department to limit the access employees have to electronic files. Ensure all company computers have the most up-to-date anti-virus, anti-spyware and firewall software. Limit the use of social security numbers in the workplace. Develop office guidelines for all employees that outlines the proper procedures for protecting sensitive information. Conduct thorough background checks on potential employees. Use a locked mailbox to send mail that contains personal or company checks, social security numbers or account information. At the end of each work day, all employees should log off their computers and lock their workstations or office doors. All confidential documents should be filed away rather than left at one’s desk. When traveling for business, employees should pay attention to their surroundings, especially when using a cell phone, laptop or BlackBerry. Ira Winkler is a national security consultant and author of “Zen and the Art of Information Security.” https://videos.whiteblox.com/gnb/secure/player.aspx?sid=34895