The first step in the way of your corporate data protection is determination of types of information that will cause a lot of damage in case of leakage. They may vary significantly depending on your company profile, but in most of cases they are:
- a database of clients,
- leads and working contacts, business contracts, invoices, and accounts,
- access passwords, etc.
You should remember that although most of data leak out of your organization unintentionally, even the smallest leak may cause a very serious damage. If we translate insignificant losses that we usually ignore into figures, we’ll see impressive statistics. One of the biggest mistakes of today’s business leaders is their confidence that their in-house IT department is able to prevent corporate data losses on its own. That’s far from reality: if you don’t have any specific data protection tools, you’re at a huge risk! A good example of such tools is a data loss prevention (DLP) solution that detects potential data breach incidents in a real-time manner and prevents them by monitoring data at 3 levels:
- in-use (endpoint actions),
- in-motion (network traffic), and
- at-rest (data storage)
So, how does a DLP system work?
When you upload a typical confidential file, one of the program modules analyzes its structure and creates its copy that will be used to monitor all of the outgoing information. Once the program detects a match in structure, keywords or another sequence of symbols, the urgent measures are taken. These measures may include a user notification of the illegitimate data transfer action, blockage of data transfer, etc. To put it in a nutshell, a regular user will be banned from:
- using a corporate email system and transferring data though a mail server, a forum, or an instant messenger (e.g., Skype or MSN),
- putting it to an external drive,
- printing it out or even taking a screenshot.
In this way we can reach the maximum possible level of electronic data protection.
Apart from protection of corporate interests, the DLP tools allow business leaders to optimize the working process, too. Seeing an employee copying corporate data to a flash drive or DVD in order to continue / finish work at home, you’ll be able to understand who of your team members fails to manage the workload during working hours and investigate the cause of this. An admin authorized to receive notifications of the illegitimate data transfer will be able to evaluate each employee’s behavior in the workplace as well as the level of improper use of corporate means of communication (e.g. web surfing, live chat etc.). By setting a non-blocking capture by a keyword such as “CV” or “cv@”, you’ll also be able to assess potential risks of staff turnover, identify employees dissatisfied with their current work and take reactive and proactive actions to solve these issues.
Source: Vladimir Liulka, CIO at Ciklum (Source), Picture: Ciklum
Ciklum ist ein dänisches IT-Outsourcing-Unternehmen, das auf Nearshore-Softwareentwicklung in der Ukraine spezialisiert ist und für Kunden eigene Entwicklerteams aufbaut und unterhält. Der Dienstleistungsrahmen und Wissensaustausch innerhalb der Firma helfen den Kunden, schnell, mit weniger Risiken und minimaler Investition die gewünschten Resultate zu erzielen. Ciklum wurde 2002 gegründet und beschäftigt heute knapp 1.800 Spezialisten in 150 globalen Kundenteams. > www.ciklum.com
Dieser Artikel wurde im Rahmen der Knowledgepartnerschaft mit dem Deutschen Outsourcing Verband und dem Outsourcing Journal veröffentlicht.