Data Loss Prevention: 5 Reasons You Need to Step Up Your Game

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Data Loss Prevention: 5 Reasons You Need to Step Up Your Game-3 Next

False-Positive Results

DLP is imprecise.

General rules are the strong suit for DLP - not specific data. DLP initiatives can be hampered by false positives and event overload. If an admin needs to foresee every potential threat scape before it occurs to make DLP effective, the input needs to be specific. If the setup for DLP is imprecise, when a policy is applied that should not be, false positives can occur.

Companies must embrace a new way of thinking to better identify and protect sensitive information that could be leaked or disclosed. There is no longer such a thing as a 'secure network perimeter.' By ignoring this fact, organizations are passively making a choice between locking data down so tightly that it hinders productivity or relaxing controls to the point that it could result in the inability to mitigate a security breach.

Organizations have turned to data loss prevention (DLP) tools as the answer to security breaches. Existing DLP offerings do an admirable job at detecting and preventing unauthorized attempts to copy or send sensitive data without authorization. Yet, they do not always provide a comprehensive security solution, because unstructured data, while easy to work with for the DLP user base, is also easily lost, leaked or stolen.

Sensitive content can be tricky for DLP solutions to identify after it's been saved or sent, as it may contain encryption, common words, vague patterns, or inexact input or context. Most DLP solutions deliver false positive rates in these instances, because, quite simply, DLP cannot always answer the important questions such as: 1) what data is truly sensitive; 2) who should have access to it; 3) how is the data to be handled; and 4) when should access be granted or revoked?

In this slideshow, Watchful Software has identified the top five reasons you should step up your data loss prevention strategy.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.