According to Sergey Vakhonin, the most actively developing channels are "consumer goods" aimed at creating convenience for users and not interacting with corporate information security tools. But the question is whether users need these "modern channels" to perform business tasks.
leaks is to control data flows on the end devices used by employees in any scenarios of their use - both inside and outside the corporate network. And if some data transmission channel cannot be controlled flexibly and selectively and at the same time it is not important for the employee to perform business functions, then it must be closed, believes Sergey Vakhonin.
Kirill Ugolev notes the increasing demand for DLP systems that ukraine whatsapp data effectively combat leaks via mobile devices. In his opinion, there are practically none today. To reduce the risks of leaks via mobile channels, some companies, in addition to DLP, use Mobile Device Management solutions, with which they essentially manage employees' mobile devices and partially control their actions. However, he believes that this is only one element of a leak protection system, and with very limited functionality. In addition, since the user gives control over a personal device (which may contain personal information), ethical and legal issues become relevant.
Vladimir Kopasov believes that it is not entirely correct to rank channels by importance in the abstract — everything depends on the specific organization: what important data it has, where it is stored, and how it is processed. For example, AutoCad models cannot be “leaked” by voice, and a database of billions of records cannot be sent by email. The optimal approach for the user is to determine the types of information to be protected, describe the risks that are relevant to them, and then, in order to minimize specific risks, select the appropriate functionality.
The most effective way to prevent
-
- Posts: 407
- Joined: Sun Dec 22, 2024 7:17 am