Page 70 - Cyber Warnings
P. 70







HOW TO PREVENT DATA LEAKING ON INTERNET


DATA LEAKING PREVENTION

by Israel Gaudette, Owner, Top VPN Canada


Data Loss Prevention (DLP) is generally thought as any solution or method that identifies
personal information, tracks that data since it moves through and in the enterprise and prevents
unauthorized disclosure of knowledge by creating and enforcing disclosure policies.

When intellectual property, customer data or sensitive information like worker personnel files are
intentionally or unintentionally leaked, the harm could be irreparable.

Data leakage may cause people to lose confidence and business deals to visit badly,
additionally to fines, law suit and status damage. Since personal information can reside on
numerous computers (physical servers, virtual servers, databases, file servers, Computers,
point-of-purchase devices, flash drives and mobile phones) and undertake numerous network
access points (wireline, wireless, VPNs, etc.), there are a variety of solutions that are tackling
the problem of knowledge loss, recovery and understanding leaks.

DLP isn't a plug-and-play solution. The effective implementation of the technology requires
significant preparation and diligent ongoing maintenance.

Enterprises trying to integrate and implement DLP should be ready for a substantial effort that, if
done properly, can help reduce risk towards the organization.

Individuals applying the answer will need to take a proper approach that addresses risks,
impacts and minimization steps, together with appropriate governance and assurance
measures.
As the quantity of internet-connected devices skyrockets to the billions, data loss prevention is
certainly an increasingly more important part of any organization’s capacity to handle and
safeguard critical and information.

Kinds of critical and data types include:

Intellectual Property: source code, product design documents, process documentation,
internal cost lists.

Corporate Data: financial documents, proper planning documents, research for acquisitions
and mergers, worker information.

Customer Data: social security figures, bank card figures, medical records, fiscal reports.



70 Cyber Warnings E-Magazine – July 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   65   66   67   68   69   70   71   72   73   74   75