Insights
Organisations typically maintain a wide variety of Endpoints within their estate – supporting Laptops and Personal Computers running Microsoft’s Windows, Linux, as well as Mobile devices (iPads, Tablets, Phones) running IOS and Android Operating Systems.
The challenge is how do you manage the data flow and protect the organisations Sensitive Data?
There are many strategies that can be used (and we have seen many implemented by clients around the world) from –
- Closing the doors for ‘non-core’ platforms (prevent access to identified data when using tablets and phones) – this can be frustrating for staff who are seasoned users on new technology
- Assume that Access Control Systems alone will prevent the loss of data – it doesn’t prevent internal theft
- Assuming that standard Security packages on laptops and PCs will stop data heft
- Manage at source – this includes effectively identifying and managing the flow of Sensitive Data within the organisation.
Developing a clear Data Loss Prevention Policies and implementing tools that identify and classify Sensitive Data, preventing its unauthorised movement internally ensures that the organisations effectively manage its sensitive data.
Using clearly defined DLP Policies and tools, its is possible to protect the organisations data whilst allowing data to be sent to customers using permissions and encryption to protect its transport and management at the destination.
Our experience in the delivery of these complex DLP projects is that implementation can be a challenge for most organisations as they require input from across the business to ensure that business data is protected. Don’t be fooled into approaching this lightly.