Traditional security solutions are
focused on preventing external security threats from reaching the network. In today’s
security
environment, this is only half the story. Data breaches are now commonplace, exposing
an
organization’s confidential and sensitive data – referred to as digital assets – to
outside
unauthorized parties. A data breach may occur as a result of internal employee mistakes
or
carelessness, data outsourcing, stolen or misplaced computing devices, or malicious
attacks.
Data breaches can:
-
Damage brand reputation
-
Erode customer trust in the organization
-
Result in unnecessary costs to cover for remediation and to pay fines for violating compliance regulations
-
Lead to lost business opportunities and revenue when intellectual property is stolen
With the prevalence and damaging effects of data breaches, organizations now
see digital asset protection as a critical component of their security infrastructure.
Data Loss Prevention
safeguards an organization’s sensitive data against accidental or deliberate leakage.
Data Loss
Prevention allows you to:
-
Identify the sensitive information that requires protection using data identifiers
-
Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email and external devices
-
Enforce compliance to established privacy standards
Before you can monitor sensitive information for potential loss, you
must be able to answer the following questions:
-
What data needs protection from unauthorized users?
-
Where does the sensitive data reside?
-
How is the sensitive data transmitted?
-
What users are authorized to access or transmit the sensitive data?
-
What action should be taken if a security violation occurs?
This important audit typically involves multiple departments and personnel
familiar with the sensitive information in your organization.
If you already defined your sensitive information and security
policies, you can begin to define data identifiers and company policies.