Traditional security solutions are focused on preventing external security threats from reaching the network. In today’s security environment, this is only half the story. Data breaches are now commonplace, exposing an organization’s confidential and sensitive data – referred to as digital assets – to outside unauthorized parties. A data breach may occur as a result of internal employee mistakes or carelessness, data outsourcing, stolen or misplaced computing devices, or malicious attacks.
Data breaches can:
-
Damage brand reputation
-
Erode customer trust in the organization
-
Result in unnecessary costs to cover for remediation and to pay fines for violating compliance regulations
-
Lead to lost business opportunities and revenue when intellectual property is stolen
With the prevalence and damaging effects of data breaches, organizations now see digital asset protection as a critical component of their security infrastructure.
Data Loss Prevention safeguards an organization’s sensitive data against accidental or deliberate leakage. Data Loss Prevention allows you to:
-
Identify the sensitive information that requires protection using data identifiers
Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email and external devices
-
Enforce compliance to established privacy standards
Before you can monitor sensitive information for potential loss, you must be able to answer the following questions:
-
What data needs protection from unauthorized users?
-
Where does the sensitive data reside?
-
How is the sensitive data transmitted?
-
What users are authorized to access or transmit the sensitive data?
-
What action should be taken if a security violation occurs?
This important audit typically involves multiple departments and personnel familiar with the sensitive information in your organization.
If you already defined your sensitive information and security policies, you can begin to define data identifiers and company policies.