Be Safe, Be Secure
Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.
Making a plan for what to do and what not to do, e.g., types of devices you need to secure and monitoring inbound avenues of threat infiltration and outbound avenues of confidential data exfiltration
Establishing detailed policies for what employees can and cannot do regarding webmail and social media access at work – taking into account employee morale as well as productivity
Deploying a multi-layered, multi-level defense that goes beyond traditional, separated defenses such as firewalls – which are largely ineffective against today's blended and targeted attacks
Symantec has released best practices/recommendation to protect data.
Security Response recommendations for Symantec Endpoint Protection settings