Data Loss Prevention

Data on your computer:

  • Data in use

  • Endpoint DLP

Data on your network:

  • Data in motion

Data on your server

  • Data at rest

DLP can allow or deny certain task. An example of this can be USB blocking. Many organizations use Cloud based DLP solution. This cloud based solution can block custom defined data strings, manage access to URLs, block viruses and malware.

Email is the most critical risk factor. It can be related to inbound threats or outbound data loss. It is necessary to check every email inbound or outbound.

Inbound - Block keywords, identify imposters, quarantine email messages.

Outbound - Fake wire transfers, W-2 transmissions, employee information.

Top DLP Best Practices:

  1. Identify the critical assets of your company.

  2. Research multiple vendors.

  3. Define incident response and remediation.

  4. Take steps one at a time and complete all checkboxes.

  5. Perform a PoC exercise.

  6. Identify the DLP Stakeholders and Support Team.

  7. Regularly inform stakeholders about the state of the DLP program.

When do you need a DLP strategy?

This is often done after vulnerabiltity assessment or cost/benefit analysis is performed. DLP strategy will provide direction on how to implement the solution and how, what and when to protect the data.

Last updated