Data security as a top priority
Your firewall is configured perfectly. Your servers are locked down like Fort Knox. You’ve spent a ton of money on security and are feeling pretty good about being protected.
Then someone uses the simplest means possible to steal sensitive data – they burn it to a DVD or e-mail it to the outside world. Data security should always be a top priority. Obviously you could prevent this type of data leak by locking down those services as well – but then how would people get their jobs done?
Always moving
The purpose of a network is move data around and data likes to move. When all of a business’ data was stored on a central mainframe, this wasn’t much of an issue – the data security on the network was mostly communication between the mainframe and dumb terminals.
But that’s not where we’re at anymore. Data is everywhere on an almost infinite number of devices, making it incredibly difficult, if not impossible, to keep track of it all. And when you don’t even know where your data is, that makes it hard to keep secure.
Taking inventory
We recently launched a new managed service to address this problem. Our Data Loss Prevention service allows businesses to not only identify their sensitive data, but keep track of it as it moves both in and outside of their network. We make data security a top priority for your business.
We start by working with key users to get an idea of what types of information the organization handles and determine the characteristics of that organization’s sensitive data.
Once we know that, we implement network tools that look for these patterns and report where that data is and where it’s going. Because these tools rely on patterns and data characteristics rather than knowing about specific sensitive files, its possible to gain a more comprehensive inventory of sensitive data than relying on internal staff to point out every file they know about.
Going outside
After your sensitive data has been identified, we can help your business protect it by blocking it from leaving the network and implementing security on the files that do make it offsite.
We implement certificate-based security into your sensitive files that requires them to “phone-home” to check if the user opening the file is authorized to do so. If they aren’t on the approved list, they can’t open the file. This functionality also allows us to keep track of where the file has been and how it left your network, giving you the ability to identify the source of data leaks.
Have questions about data security?
Does Data Loss Prevention sound like a service that could benefit your business? Give us a call to see if we can help protect your sensitive business data. Or check out our assessment pages to figure out whether a deep dive security assessment may be a better choice for your organization.