{"id":5094,"date":"2024-01-23T18:47:35","date_gmt":"2024-01-23T18:47:35","guid":{"rendered":"https:\/\/www.compucom.com\/?p=5094"},"modified":"2024-04-04T21:20:40","modified_gmt":"2024-04-04T21:20:40","slug":"5-ways-to-improve-data-privacy-in-the-hybrid-workplace","status":"publish","type":"post","link":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/","title":{"rendered":"5 Ways to Improve Data Privacy in the Hybrid Workplace"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"border:1px solid rgba(193, 46, 107, 0.3); color:#000018;  font-family:'Poppins'; font-size:14px; line-height: 18px; padding: 10px 2em 10px 10px; display: inline-block;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/05\/cropped-compucom-ico.png\" style=\"margin-top: -40px; float: left; max-width: 60px; border-radius: 50px; box-shadow: 1px 1px 5px 1px #999;\" alt=\"Emma Mak, Staff Writer\"><p style=\"padding-left:6em; margin:0;\"><strong>Emma Mak<\/strong> \u2022\u202fStaff Writer<\/p><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In January 1981, the first legally binding international treaty dealing with privacy and data protection was signed. Since then, the extent of the world&#8217;s digital interconnectivity has grown exponentially, with individuals and organizations accessing data from almost everywhere in the world.&nbsp;<a href=\"#five\"><\/a><\/p>\n\n\n\n<p>In honor of National Data Privacy Week, a celebration of that signing and a call for individuals and businesses to understand and respect privacy and data protection, here are five ways to improve data privacy in your hybrid workplace.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">1. Understand Your Risk Posture<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A clear-eyed view of your company&#8217;s cybersecurity posture helps identify vulnerabilities and improvement opportunities. An assessment should include quantifying risks, finding gaps, and comparing your overall posture to industry and global standards.<\/p>\n\n\n\n<p class=\"blog-link\">Don&#8217;t be shocked if your company falls short. A <a href=\"https:\/\/www.cisco.com\/c\/dam\/m\/en_us\/products\/security\/cybersecurity-reports\/cybersecurity-readiness-index\/2023\/cybersecurity-readiness-index-report.pdf\" rel=\"noreferrer noopener\" target=\"_blank\">2023 Cisco Cybersecurity Readiness Report<\/a> indexed companies on five pillars of security: identity (users), devices, network, application workloads, and data. They concluded that only 15% of organizations globally had a mature level of preparedness to handle the security risks associated with hybrid work.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">2. Implement Zero-Trust Access\u00a0<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"blog-link\"><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_The_Zero_Trust_Model_in_Cybersecurity_2022.pdf\" rel=\"noreferrer noopener\" target=\"_blank\">Zero-Trust Access<\/a> is a security model that requires continual authentication of users, devices, and applications, whether inside or outside the organization&#8217;s perimeter. It operates under the valid assumption that breaches will happen and focuses on detection, response, and rapid recovery to limit their consequences. Implementing Zero-Trust Access helps enhance data privacy in a hybrid workplace by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reducing risk to endpoints<\/strong> by ensuring that every access request is fully authenticated, authorized, and encrypted before granting access<\/li>\n\n\n\n<li><strong>Improving compliance and intellectual property protection<\/strong> by verifying each transaction and asserting least privilege access<\/li>\n\n\n\n<li><strong>Safeguarding identities with multifactor authentication (MFA)<\/strong> for all user identities accessing the environment, providing an additional layer of security from unauthorized access<\/li>\n<\/ul>\n\n\n\n<p>Your security model should balance safeguards with good user experience to ensure productivity is maintained and users don&#8217;t consider circumventing systems just to get their work done.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">3. Protect Your Last Line of Defense \u2014 Your Users<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Distributed workers may access your company&#8217;s data from any location and be required to manage multiple passwords. This makes users a useful \u201cgateway\u201d for bad actors to exploit, especially for companies using a weak security model that allows attackers to move laterally within the network.&nbsp;<\/p>\n\n\n\n<p class=\"blog-link\">Having multiple layers of security to protect users is a wise investment. As part of a broader Zero Trust approach, implementing a comprehensive security product like <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/duo\/what-is-duo.html\" rel=\"noreferrer noopener\" target=\"_blank\">Cisco\u2019s Duo<\/a> helps protect your users with features including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Multifactor Authentication (MFA)<\/li>\n\n\n\n<li>Device Trust<\/li>\n\n\n\n<li>Adaptive Access Policies<\/li>\n\n\n\n<li>Single Sign-On&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">4. Educate Employees on Phishing Scams<\/h2>\n\n\n\n<p>Implementing comprehensive security solutions goes a long way to protecting your company, but criminals are unrelenting in their pursuit of valuable data. Phishing scam strategies are always changing to get your employees to divulge sensitive information \u2013 and generative AI has been a big boost for attackers, enabling more sophisticated phishing campaigns.<a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\" rel=\"noreferrer noopener\" target=\"_blank\"><\/a><\/p>\n\n\n\n<p class=\"blog-link\"><a href=\"https:\/\/www.cisa.gov\/secure-our-world\/teach-employees-avoid-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Providing regular training<\/a> to your workforce will set them up to guard and remain vigilant against the latest phishing attacks \u2014 and is an essential part of your cybersecurity strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">5. Take Care of Old and Decommissioned Assets\/Devices<\/h2>\n\n\n\n<p class=\"blog-link\">Ensure the safe disposal of obsolete or unwanted IT equipment in a manner that is mindful of your data security and environmental impact with robust <a href=\"\/protect-your-brand-dont-let-ewaste-become-your-achilles-heel\" target=\"_blank\" rel=\"noreferrer noopener\">ITAD (IT Asset Disposition)<\/a> policies. These can significantly improve data privacy for your hybrid workforce by completely wiping data from devices before they are disposed of or repurposed \u2013 preventing sensitive information from falling into the wrong hands.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">How a Managed Services Provider (MSP) Can Help\u00a0<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>When looking for an MSP to help fortify your company&#8217;s privacy and data protection capabilities and keep up with the constant wave of ever-evolving cyber threats, look for one with strong, long-term partnerships with industry leaders like Cisco. &nbsp;<\/p>\n\n\n\n<p>At Compucom, we can advise you on developing and maintaining a resilient cybersecurity posture, from assessing your current tools and systems to helping you navigate the deployment and integration of best-fit security solutions across your IT infrastructure.&nbsp;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In January 1981, the first legally binding international treaty dealing with privacy and data protection was signed. Since then, the extent of the world&#8217;s digital interconnectivity has grown exponentially, with individuals and organizations accessing data from almost everywhere in the world.\u00a0<\/p>\n","protected":false},"author":8,"featured_media":5114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[49],"tags":[66,62,73],"class_list":["post-5094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-projects-and-professional-services","tag-cybersecurity","tag-digital-transformation","tag-itad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom<\/title>\n<meta name=\"description\" content=\"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom\" \/>\n<meta property=\"og:description\" content=\"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/\" \/>\n<meta property=\"og:site_name\" content=\"Compucom\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-23T18:47:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-04T21:20:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marketing Compucom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing Compucom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/\"},\"author\":{\"name\":\"Marketing Compucom\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\"},\"headline\":\"5 Ways to Improve Data Privacy in the Hybrid Workplace\",\"datePublished\":\"2024-01-23T18:47:35+00:00\",\"dateModified\":\"2024-04-04T21:20:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg\",\"keywords\":[\"Cybersecurity\",\"Digital Transformation\",\"ITAD\"],\"articleSection\":[\"Projects and Professional Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/\",\"name\":\"5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg\",\"datePublished\":\"2024-01-23T18:47:35+00:00\",\"dateModified\":\"2024-04-04T21:20:40+00:00\",\"description\":\"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Man working on a laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.compucom.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Ways to Improve Data Privacy in the Hybrid Workplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"name\":\"Compucom\",\"description\":\"Technology Driven. People Powered.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.compucom.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\",\"name\":\"CompuCom Systems Inc\",\"alternateName\":\"Compucom\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"width\":512,\"height\":512,\"caption\":\"CompuCom Systems Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compucom\\\/posts\\\/?feedView=all\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\",\"name\":\"Marketing Compucom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"caption\":\"Marketing Compucom\"},\"url\":\"https:\\\/\\\/www.compucom.com\\\/author\\\/marketing_chicomp101\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom","description":"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/","og_locale":"en_US","og_type":"article","og_title":"5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom","og_description":"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.","og_url":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/","og_site_name":"Compucom","article_published_time":"2024-01-23T18:47:35+00:00","article_modified_time":"2024-04-04T21:20:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg","type":"image\/jpeg"}],"author":"Marketing Compucom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing Compucom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#article","isPartOf":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/"},"author":{"name":"Marketing Compucom","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a"},"headline":"5 Ways to Improve Data Privacy in the Hybrid Workplace","datePublished":"2024-01-23T18:47:35+00:00","dateModified":"2024-04-04T21:20:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"image":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg","keywords":["Cybersecurity","Digital Transformation","ITAD"],"articleSection":["Projects and Professional Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/","url":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/","name":"5 Ways to Improve Data Privacy in the Hybrid Workplace - Compucom","isPartOf":{"@id":"https:\/\/www.compucom.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#primaryimage"},"image":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg","datePublished":"2024-01-23T18:47:35+00:00","dateModified":"2024-04-04T21:20:40+00:00","description":"In honor of National Data Privacy Week here are five ways to improve data privacy in your hybrid workplace.","breadcrumb":{"@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#primaryimage","url":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg","contentUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-5-Ways-to-Improve-Data-Privacy-in-the-Hybrid-Workplace-.jpg","width":1200,"height":628,"caption":"Man working on a laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.compucom.com\/5-ways-to-improve-data-privacy-in-the-hybrid-workplace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.compucom.com\/"},{"@type":"ListItem","position":2,"name":"5 Ways to Improve Data Privacy in the Hybrid Workplace"}]},{"@type":"WebSite","@id":"https:\/\/www.compucom.com\/#website","url":"https:\/\/www.compucom.com\/","name":"Compucom","description":"Technology Driven. People Powered.","publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.compucom.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.compucom.com\/#organization","name":"CompuCom Systems Inc","alternateName":"Compucom","url":"https:\/\/www.compucom.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","contentUrl":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","width":512,"height":512,"caption":"CompuCom Systems Inc"},"image":{"@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compucom\/posts\/?feedView=all"]},{"@type":"Person","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a","name":"Marketing Compucom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","caption":"Marketing Compucom"},"url":"https:\/\/www.compucom.com\/author\/marketing_chicomp101\/"}]}},"_links":{"self":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/comments?post=5094"}],"version-history":[{"count":1,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5094\/revisions"}],"predecessor-version":[{"id":5115,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5094\/revisions\/5115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media\/5114"}],"wp:attachment":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media?parent=5094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/categories?post=5094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/tags?post=5094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}