Many organisations now recognise employees as the weakest 'security point' because of where they work and how they work (using public Wi-Fi networks, multiple devices, etc.)
As a result, security identity, access management and technology plans are essential to lock down your main source of weakness; the individual.
You can't always be sure that the user logging on to your network, applications or devices is the right person - this is where traditional security solutions (Mobile Device Management, Mobile Application Management and firewalls) can be complemented with additional measures to protect your organisation from unnecessary risk.
What is data loss prevention (DLP)?
The term Data Loss Prevention (DLP) refers to the practice of detecting and preventing the leakage of confidential data outside an organisation for unauthorised use. Data may be taken out of the organisation in physical or computerised form, intentionally or unintentionally.
The concern for data protection is not new, as highlighted in the very interesting Ernst & Young report "The evolving IT risk landscape" published in 2011.
How is DLP different from other technologies?
Your data loss prevention strategies should be as broad as the causes of the loss.
Here are some of the most common ones:
- Human error: The majority of data loss is caused by human error. This can include actions such as: opening malicious email, creating easy-to-guess passwords, logging into "fake" sites, walking away from one's computer without logging out, leaving access to unauthorised people.
- Insufficient access control: Many organisations give access too easily. People who only need to read the data are also allowed to modify it. When too many accounts have too much access, data thieves seize the opportunity to compromise an account.
- Physical theft: Mobile phones, tablets, laptops, ... are easy to steal and if not well protected, are a gold mine of information.
- Malicious software: Infected systems send out confidential information and systems can continue to operate in this way for months before the problem is detected.
How do you protect your data in practice?
In addition to all the points we have discussed above, the implementation of specific information protection software will allow a global view of sensitive data and control of their use.
First and foremost, an audit will enable the organisation to answer these 3 fundamental questions:
What sensitive data do you hold?
Common data types are of type:
- Personally identifiable information (AHV number, name, address, etc.)
- Payment card information
- Customer information
- Intellectual property / proprietary information
- General information for internal use only
- Information for public use (marketing,..) requiring fewer restrictions.
Where does your sensitive data reside, both internally and with third parties?
Common data storage locations are:
- On-site / network storage
- Storage Cloud, SaaS (Software as a service)
- Hardware storage, including laptops and desktops, mobile devices, external hard drives,...
Where does your data go?
Define criteria and company policies
It will also be necessary to define the criteria and policies according to the needs of the organisation (for example, if an HR employee consults a salary slip, this is a normal process, if this document is opened by someone outside the department, an alert should be displayed and followed up. The program can also be customised so that an employee who has made improper use of a document receives an email informing them of their action, just as an employee who copies credit card data into a word document receives a notification.
A correct implementation of DLP can therefore mark data as sensitive and assign a high critical score. Common exit points for this type of data breach are corporate email, web mail, FTP, removable drives and printing. At each of these exit points, DLP can flag this activity.
Tell us about your project!
For more information, please contact us. Our experts will guide you through your project, from audit to implementation, your data will be in good hands.