Data Leakage Prevention – Protecting Sensitive Information

When DuPont lost $400 million in intellectual property, it wasn’t because a hacker from the other side of the world infiltrated their system. The information was simply stolen by a former employee. Alarmingly, data loss incidents are not always caused by deliberate actions.

A file containing personal information accidentally attached to an email and sent to multiple recipients; financial data stored in a USB pen drive, accidentally left in a restaurant; or bank account data of colleagues, inadvertently posted on a company website – these are also some of the everyday causes of data loss.

A report done by research company Infowatch regarding global data leaks in 2010 showed that there were actually more accidental data leaks in that year compared to intentional ones. Accidental leaks comprised 53%, while intentional leaks comprised 42% (the rest were unidentified).

But even if they ?only? happened accidentally, breach incidents like these can still be very costly. The tens of thousands of dollars that you could sometimes end up paying in civil penalties (as in the case when you lose other people?s personal information) can just be the beginning. More costly than this is the loss of customer and investor confidence. Once you lose those, you could consequently lose a considerable portion of your business.

Confidential information that may already be leaking out right under your nose

With all the data you collect, process, exchange, and store electronically every day, your IT system has surely now become a storehouse of sensitive information. Some of them, you may be even taking for granted.

But imagine what would happen if any of the following trade secrets fell into the wrong hands: marketing plans, confidential customer information, pricing data, product development strategies, business plans, supplier information, source codes, and employee salaries.

These are not the only kind of data that you should be worried about. You could also get into trouble if your sloppy IT security fails to protect employee or client personal information such as their names; social security numbers; drivers license numbers; or bank account numbers and credit/debit card numbers along with their corresponding PINs.

In some countries, you could face onerous data breach notification requirements and heavy fines when these kind of data are involved.

There are now more holes to plug

It’s not just the different varieties of sensitive electronic information that you have to worry about. Because these data can take on different forms, i.e. data-at-rest, data-in-motion, and data-at-the-endpoints, you also need to take aim at different areas in your IT system.

Sensitive information can be found ?at rest? in each of your employees? hard disks, in your servers, storage disks, and in off-site backup disks. They can also be found ?in motion? in email, instant messaging, social networking messaging, P2P file sharing, ftp, http, and so on.

That’s not all. Your highly mobile workforce may have already introduced yet another high-risk area into your system: data-at-the-endpoints. This includes USB flash-disks, laptops, portable hard disks, CDs, and even smartphones.

The main challenge of data leak prevention

Having been made aware of the various aspects of data leakage, have you already come to grips with the extent of the task at hand?

There are two major things you need to do here to prevent data leakage.

One, you need to identify what data you have that can be considered as sensitive/confidential information. Of course you have financial information and employee salaries in your files. But do you also store personally identifiable information? Do you have trade secrets that are stored in electronic form?

Two, you need to pinpoint their locations. Are they only on your hard disks and laptops? Or have they made their way to flash drives, CDs/DVDs, or portable HDDs? Are they being transmitted through email or any other file transfer media?

The reason why you need to know what your sensitive data are as well as where they are is because you would like all efforts of securing them to be as efficient and unobtrusive as possible.

Let’s say, as a way of protecting your data, you decide to implement encryption. Since encryption can consume a lot of storage space and significantly reduce performance, it may be impractical to encrypt your entire database or all your files. For the same reason, you wouldn’t want to encrypt every single email that you send.

Thus, the best way would be to encrypt only the data that really need encryption. But again, you need to know what data needs to be encrypted and where those data can be found. That alone is no simple task.

Not only will you need to deal with the data you already have, you will also have to worry about the data that will go through your systems during the course of your day-to-day transactions.

Identifying sensitive data as it enters or leaves your system, goes through your network, or gets stored in your file system or database, and then applying the necessary security actions should be done automatically and intelligently. Otherwise, you could end up spending on a lot of man-hours or, worse, wasting them on a lot of false positives and negatives.

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK

Check our similar posts

Mobile Workforce Management in a nutshell

It is fairly common for businesses to have staff working across many different locations across the country or even the world.  Engaged in various activities like  door-to-door sales, delivery and installations, service maintenance, conducting inspections & investigations or even data collection.

Managing and co-ordinating tasks, scheduling activities, planning and monitoring activities and communicating can often be challenging.

Mobile Workforce Management is the automation of the entire end-to-end workflow management and operations of any field service workers. 

Mobile Workforce Management Synonyms

Mobile Workforce Management is also known as

  • Field Service Management
  • Job Scheduling Software
  • Job Management Software

Advantages of Mobile Workforce Management

It is increasingly clear that there needs to be a certain sense of discipline and streamlining of field operations and important to automate certain tasks within field sales and operations, primarily because it helps you to track your assets remotely and ensuring contact with your workforce when required. Enabling your team to get in touch when required.

Most importantly, engineers, sales representatives and customer care executives can easily send information, scan receipts, Invoice customers and retrieve other crucial information in a standardized and streamlined manner. Assisting in regulating your business and also bringing some order to what is usually a very chaotic mode of working.

Why choose Mobile Workforce Management

Work Force Management tools help you to stay in control. They assist in automating what can and should be automated leaving only the crucial human-human interactivity. Helping you to keep a record of all interactions and important data within a database, without you having to manually go through sales receipts, complaint slips and other such details.

A Field Force Management tool is a time-saver and efficiency tool for companies. Moreover, these tools help to automate several aspects of your day to day operations, leading to an increase in productivity and motivation.

Streamlining operations, will also ensure that important stakeholders are well informed and management visibility is enhanced. Helping your business to make smarter decisions and help serve your customers better.

Field Force Management is similar to an Enterprise Resource Planning (ERP) solution but is vastly different. It is specifically targeted at staff that work on the field and is intended to make their and your work more streamlined, transparent and easy to track.

Cloud based solutions help you automate

 Field Force Management is usually cloud based which means all data is stored and accessible on secure cloud servers. There is no question of losing important data or not being able to retrieve something important. If something goes missing, there will usually be a backup available. Field force management tools include the software, the hardware and also the kind of training that is required for users to use it efficiently.

The software usually helps in saving and processing information while the hardware helps employees to enter important data into devices while they are on the job. Sometimes, field force solutions can also be a mobile app which negates the need for a specific or special device.

This is very important when it comes to field jobs as carrying different devices can prove to be a cumbersome job. At the end of the day, field force solutions are meant to reduce the burden on staff and not actually inadvertently increase it.

Denizon?s FieldElite Mobile Workforce management application provides significant improvements in efficiency and service with a switch to digital working and the elimination of paperwork.

All the information that is stored on the cloud can be run through analytics software so that you get the kind of reports that you are looking for to improve your business.

Field Force Management Process

A field force management tool helps you to remain in contact with your staff while they are at work on the field. This helps you to track your personnel in real time. Field personnel or your staff can log in and enter their attendance using a smartphone. You can assign that particular day?s task remotely using a web console or your own smartphone.

Next, they can carry out whatever duties they need to while you get all the alerts that you set to receive. This helps to increase transparency. You can choose to receive alerts on your phone or on your desktop.

Finally, staff can tag completed tasks with audio and images, instead of they having to type reports. This helps to focus more on the job than on job reporting. Last but not the least, location tags help you to ensure that the job is done at the right place. Your staff will not be able to take your generosity for granted.

All in all, a field force management tool helps you to track and control your staff without you having to be physically present with them and this is the beauty of this tool.

Summary

Field Force Management helps companies to reduce administration expense and improve productivity. This helps to automate data integration which is usually done with the help of cloud servers. Moreover, you can set invoice parameters that help you to also keep track of stocks, inventories and engage in P.O. and task management.

A number of field force management users also use it as a tool to engage in credit management. Banks and insurance companies particularly find this tool helpful as payments can be received on the job, instead of asking customers to pay online or offline. This also helps in building valuable customer relationships and enhance loyalty.

Thirdly, a field force management tool helps to increase planning efficiency. This means, you will be able to allocate tasks and optimize routing. All this helps to increase your ROI at the end of the day and get back the money you invest on field force management.

Finally, you will have more control over productivity and sales thanks to automation of data collection. You will also have more control over the execution of tasks and that will invariably make your company leaner and smarter.

How Bouygues manages an Empire-Sized Footprint

Bouygues is into telecoms / media, and building and road construction. It also knows it has to watch its energy footprint closely. Owning 47% of energy giant Alstom keeps it constantly in the media spotlight. Shall we find out more about its facility management policies?

The journal Premises and Facilities Management interviewed MD Martin Bouygues on his personal opinions concerning managing energy consumption in facilities. He began by commenting that this was hardly a subject for the C-Suite in years gone by. Low-level clerks simply paid the bills following which the actual amounts were lost in the general expenses account. That of course has changed.

Early pressure came from soaring energy bills, which were pursued by a whole host of electricity-saving gadgets. However, it was only after the carbon crisis caught business by surprise that the link was forged to aerial pollution, and the social responsibilities of big business to help with the solution. The duty to have an energy strategy became an obligation eagerly policed by organisations such as Greenpeace.

Unsurprisingly, Martin Bouygues? advice begins with keeping energy consumption and its carbon footprint as high up on the agenda as health and safety. ?It needs bravery and a lot of hard work to get it there,? he says, ?so perseverance is the key?. 

The company has developed proprietary software that enables it to pull data from remote sensors in more than 80 countries every fifteen minutes. A single large building can contribute 50 million data items annually making data big business in the system. Every building has an allocated energy performance contract against which results are reported monthly, as a basis for reviewing progress.

The system is intelligent and able to incorporate low-occupancy periods such as weekends and public holidays. What is measured gets managed. We all know that, but how many of us apply the principle to our energy bills. With assistance from ecoVaro, the possible becomes real.

We offer a similar service to the Bouygues model with one notable exception. You don’t buy the software and you only pay when you use it. Our systems are simply designed for busy financial managers.

Computer Forensics

So you had a customer data security breach last weekend? Do you know you could be held liable in court for failing to implement required security procedures? That’s right. Due to the overwhelming surge in identity theft wherein nearly 20 million Americans have already been affected, most states have enacted laws to curtail this fast rising crime. Therefore, it is important to redefine how your company deals with customer data security.

  • First, you’ll want to know what your obligations are as dictated by law. Some places, for example, require the destruction or deletion of personal data through shredding, erasing, or by rendering them undecipherable.
  • Second, not only do you need to comply with the said requirements, you’ll also have to prove in court that you actually complied if ever a security breach does happen.
  • Third, you need to be aware of your post-breach duties to avoid being dealt additional penalties.

Obviously, such situations now call for individuals who are experts in both the legal and technical aspects regarding data security. Such individuals are practitioners of a relatively new discipline known as computer forensics.

Armed with our computer forensics specialists, we’ll be able to help you deal with the above concerns. As a result, you can be prevented from having to pay fines that can go up to hundreds of thousands of euros.

There are other equally important reasons why you would want to avail of computer forensics services. For example, you’ll need computer forensics specialists because you want to:

  • Catch a person involved in criminal activities such as child porn, stealing of personal data, and destroying intellectual property.
  • Investigate a computer, network, or even a mobile device for clues that may lead to the culprit.
  • Determine the extent and possible causes when you discover your digital data has been damaged.
  • Find and recover damaged, deleted or encrypted data regardless of whether the cause was intentional or not. If the data in question will be used as evidence in a legal action, there are certain procedures that need to be followed during recovery operations to retain the integrity of the data. Computer forensic specialists are highly qualified for such operations.
  • Implement security policies in your organisation. Such policies have to operate within legal bounds if you want to avoid possible sanctions in the future. These policies should also be designed such that future forensic operations can be conducted with a high likelihood of success.

That said, a company that integrates computer forensics into its IT security policies and practices will be better equipped to remedy the situation once data security has already been compromised than a company that doesn’t.

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK

Ready to work with Denizon?