Page 42 - Cyber Warnings
P. 42







By taking an active part in classification, users become more aware and accountable for the
classification of the information being shared with as little effort as a single click.


The act of applying classification and seeing it applied by others heightens users’ awareness of
data security.

Even with implementation of clear policy and well-meaning employees, though, mistakes will still
be made. Some solutions provide a classification policy engine so that users are given the
chance to correct mistakes before they happen.


Policy alerts appear before the internal email is sent to unauthorized recipients, before the file is
printed to an unsecured location, or before a highly sensitive file is uploaded to an unauthorized
cloud storage service. Policy alerts are sometimes completely customizable to suit the
education and workflow requirements of customers.


These alerts can provide details to the user about why the action is a threat, provide automatic
remediation or even empower the user to continue with the risky action once the user provides
justification.


Organizations have been entrusted with personal data from its customers and clients – some of
it critically sensitive in nature.


This information must be guarded using every possible effective means, against both malicious
outsiders and oblivious insiders.


With so many stories lately about stolen laptops and misplaced flash drives leading to data
breaches, organizations would do well to create a culture of cybersecurity by implementing the
powerful tool of data classification.

About the author:
Stephane Charbonneau is one of the original founders of TITUS, and
serves as Chief Technology Officer. His background as an IT Security
Architect helps ensure the company’s product suites meet customer
requirements.

Stephane spent many years as a technology consultant, working with large
international organizations in the public and private sector. For more
information please visit http://www.titus.com








42 Cyber Warnings E-Magazine – April 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   37   38   39   40   41   42   43   44   45   46   47