Tools and tips for successfully preventing data leakage
More than 4.8 million emails, 3 million database files, and 2.1 million PDFs from the Panamanian law firm Mossack Fonseca is the result of the largest information leak in history
After the breaking news this week about one of the biggest IT security breaches in history with 11.5 million documents stolen containing confidential information about offshore companies associated with famous people and leaders worldwide; it comes again the question on the capability of companies and institutions to keep its confidential information safe and private.
Many companies and individuals are not yet conscious enough about the fact that information breaches are today one of the reasons why companies lose a lot of money, customers, their good reputation and public image. This risk is specially high when the confidential information needs to be shared with third parties as they may not be diligent enough at protecting our key information.
The right question to be done is not IF we should use an IRM (Information Rights Management) solution to keep privacy and control on the confidential information at our organization but WHICH of the solutions available on the market should be selected and deployed.
Business Analysts such as KuppingerCole indicate that in the next three years, the deployment of this type of solutions will grow exponentially and have selected Prot-On as a product leader in this market.
In addition to using an IRM as Prot-On we also offer you these suggestions:
- Protect portable devices by keeping them in your possession or locked up at all times, not sharing your work devices or using them for personal activities, not forwarding confidential information from work systems to personal devices.
- Ensure workers are made aware and train them on the importance of keeping corporate data protected.
- If you use the Cloud based storage always use a security tool compliant with that service.
- If an employee or consultant stops working for the company make sure you control which documents they take with them and ensure they no longer can access confidential data.
- Use strong passwords and change them regularly.
- You always updated work tools you use in your enterprises; systems, browsers, software … etc.