SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
How to protect your critical information easily


                       Safeguarding massive amounts of sensitive, confidential data—from legally protected
                       personal information to intellectual property and trade secrets—from malicious attacks
                       and accidental loss is one of IT’s biggest challenges. With employees having greater
                       mobility than ever before to work outside the office, the job of protecting data has never
                       been more difficult. Organizations must find a balance between protecting data and
                       allowing it to flow easily around the business and between employees and partners. This
                       white paper identifies the areas an effective strategy needs to address and describes how
                       organizations can make data protection easy and cost-effective.




A Sophos white paper       November 2009r
A Sophos white paper      How to protect your critical information easily




                       How to protect your critical information easily

                       Summary                                                     time to complete and even sometimes never
                       Safeguarding massive amounts of sensitive,                  getting done at all.
                       confidential data—from legally protected personal        • Other companies may choose to deploy
                       information to intellectual property and trade              multiple solutions addressing different aspects,
                       secrets—from malicious attacks and accidental               but not in a consistent way. This comes with
                       loss is one of IT’s biggest challenges. Forrester           its own problems. It affects the performance of
                       Research says 288 million records were lost in              computers and causes pain for IT with multiple
                                                                                   management consoles, licenses and support
                       the United States in 2008 and that 52% of the
                                                                                   numbers to call.
                       nation’s large organizations lost confidential data in
                       2007 and 2008. From a financial perspective, the         The goal for an IT manager is to secure sensitive
                       Ponemon Institute estimates each lost customer           data without exceeding your operating budget
                       record costs a business more than $200, with             or overloading your team. This is an especially
                       about $150 of that in indirect costs, including          daunting challenge when data is on the move.
                       abnormally high levels of customer turnover. That        Sending data via email, putting it on a USB
                       translates to an average organizational cost per         thumb drive or burning it to a disk all increase the
                       data breach of more than $6.6 million (Ponemon           potential for malicious attacks or careless handling
                       Institute LLC, “Fourth Annual US Cost of Data            of sensitive information.
                       Breach Study,” January 2009). Such breaches can
                       damage a business’s reputation, destroy customer         With that in mind, there are four key areas that IT
                       trust and adversely affect the bottom line.              should consider for building a solid yet manageable
                                                                                data protection strategy. You could approach each
                       With employees having greater mobility than              of these four areas in turn, but addressing them
                       ever before to work outside the office, the job of       all together will give you a comprehensive strategy
                       protecting data has never been more difficult.           whose whole is greater than the sum of its parts:
                       Organizations must find a balance between
                       protecting data and allowing it to flow easily              1. External threats and malware: Stop
                       around the business and between employees and               malware and hackers from maliciously stealing
                       partners. This white paper identifies the areas an          data and compromising your security.
                       effective strategy needs to address and describes
                       how organizations can make data protection easy             2. Complying with policies: Make sure that
                       and cost-effective.                                         users are adhering to the policies you put into
                                                                                   place.

                       Avoiding the usual problems                                 3. Preventing data loss: Stop users from being
                       There are a couple of common approaches to                  careless with data.
                       implementing data protection, which ordinarily end
                       in pain:                                                    4. Securing mobile data: Ensure that
                                                                                   sensitive data can’t be compromised if users
                       • Some companies may choose to implement a                  lose devices, while still allowing data to be
                          dedicated data loss prevention (DLP) solution.
                                                                                   exchanged among authorized users.
                          However, this can often prove to be costly and
                          hopelessly complex—often taking too much


                                                                                                                                     1
A Sophos white paper      How to protect your critical information easily




                       Protecting against external threats and              It’s one thing to have all your policies neatly
                       malware                                              documented, but it’s an entirely different thing
                                                                            to get people to comply. Deploying a technology
                       Today’s malware targets any data that can be         solution enables you to enforce policies and
                       sold—from financial information to blueprints. If    monitor activity across your organization. This also
                       it’s valuable, the bad guys want it. Stopping the    helps you to prove that you are taking appropriate
                       threats and keeping your network clean gives you     action to protect the sensitive and confidential data
                       a strong foundation on which to build your data      on your network.
                       protection strategy.
                                                                            Making compliance easy
                       To stay ahead of these escalating threats, your      When it comes to policy compliance, you need
                       organization needs a solution that detects and       to quickly create and deploy policies across your
                       defends against known threats—preventing most        organization. Plus, you need to monitor and
                       from getting into your system in the first place—    control the use of all your devices and programs,
                       while also being able to effectively detect, block   from USB storage devices and instant messaging
                       and remotely clean up emerging, unknown threats.     applications to email and web access and blocking
                       Such comprehensive performance will give your        the use of P2P software. So you should look for a
                       business the advantage it needs in the battle        comprehensive yet simple solution. Such a solution
                       against malware and external threats.                should identify specific devices to which data
                                                                            can—and cannot—be written. The result will be
                       Stopping threats and keeping your network            that you’ll protect your data without slowing the
                       clean                                                information superhighway down to the speed of a
                       The first steps to ensuring your sensitive data is   winding country road in the name of security.
                       protected involve stopping threats before they
                       cause potentially devastating damage and keeping
                       your network clean. Look for a solution that         Preventing data loss
                       features proactive protection that detects known,    An organization that has successfully implemented
                       unknown and emerging threats. Such a solution        a dedicated DLP solution is an exception to the
                       will block malware from reaching the system in       norm. Most businesses wrestle with this issue
                       the first place. But if something malicious does     and are unsure of the best way to attack the
                       actually make it onto your network and attempt       problem. For the vast majority of organizations,
                       to steal data, your security will detect, block      implementing a dedicated DLP solution is like
                       and remotely clean it, ending the threat before it   using a sledgehammer to crack a nut.
                       begins.
                                                                            A better, more cost-effective approach is to
                                                                            integrate data loss prevention into the anti-virus
                       Complying with policies                              solution your company is you’re already using.
                       Regulations regarding securing confidential,         Having a single endpoint agent that not only
                       personal data continue to grow more numerous         stops the external threats but also monitors the
                       and more stringent. Retailers and healthcare         movement of sensitive data keeps the organization
                       providers are now joined by virtually every other    protected while reducing the impact on system
                       type of business that handles customer information   performance.
                       under the microscope of regulatory compliance for
                       data security.                                       One potential nightmare for an organization—and
                                                                            its IT manager—is a user who sends an email with


                                                                                                                               2
A Sophos white paper      How to protect your critical information easily




                       confidential data attached and accidentally copies     things, and that can compromise data security.
                       an unauthorized, external recipient. Once he or she    Each week, more than 12,000 laptops are lost at
                       pushes the send button, that data is off to where it   airports—that’s more than 600,000 laptops per
                       shouldn’t go—unless your DLP solution features a       year. Most are left behind at security checkpoints
                       gateway that can identify that the data in question    and up to 70% of those are never reclaimed,
                       shouldn’t be sent to an external recipient and stops   according to the Ponemon Institute (Ponemon
                       the transfer before it is completed. That’s how easy   Institute LLC, “Airport Insecurity: The Case of
                       it would be if your anti-virus product could also      Missing & Lost Laptops,” June 30, 2008). Further
                       manage your DLP needs.                                 exacerbating the situation, more than half of the
                                                                              business travelers surveyed by Ponemon said
                       An integrated solution                                 they store sensitive data on their laptops, and the
                       An integrated endpoint agent should monitor all        majority of those admitted they do not back up or
                       of the common ways users can move data off             secure that data. Encrypting the data significantly
                       the network using various devices or programs—         reduces risk. It enables employees to do their jobs
                       removable storage devices, CD/DVD/floppy               and helps your company avoid becoming another
                       drives and internet-enabled applications such          data-loss headline.
                       as web browsers, email clients and even instant
                       messaging. It also should offer varying levels of      It’s easy to say, but is it easy to do?
                       control so you can choose the one that works           The best way to prevent data loss from mobile
                       best for your business and help to educate your        devices is to encrypt the files stored on them.
                       users on the importance of protecting sensitive        However, organizations need to share data in
                       data. For example, you could choose the gentle         the normal course of business and that’s where
                       approach and have the product tell the user he or      problems arise. It’s difficult to secure data on
                       she is being careless with data. Or take a stronger    removable media and share it as needed. You
                       approach and block a user’s ability to place           could ask everyone to use encrypted USB drives,
                       sensitive information—such as a customer billing       but that’s not always practical. The idea is to
                       database—onto a USB drive or burn it to a CD.          maintain mobility and productivity while protecting
                                                                              data and minimizing the impact on the end user,
                       Also consider gateway protection to catch any          so evaluate solutions that make it easy for users
                       accidental attempts to send protected data to          to secure data on any USB storage device—
                       the wrong person. It will prevent disasters and        otherwise they are more than likely to avoid doing
                       keep that proprietary or confidential data where it    it altogether.
                       should be—within your company.
                                                                              Even if your organization’s employees don’t lose
                                                                              their laptops, some of them inevitably will forget
                       Securing mobile data                                   their passwords while they’re traveling and your
                       Several solutions, such as encryption, are available   IT team will get their SOS at any time of the day
                       to protect data at rest on the network. But when       or night. Look for a solution that delivers a simple
                       data starts moving, it is at a much greater risk of    way for users to recover passwords themselves
                       being compromised or lost, whether it’s moving         wherever they are—it will speed up the process for
                       because someone is taking it off the network or        them and avoid costly IT hotline calls.
                       because it’s on the laptop of an employee who’s
                       traveling.                                             Encryption is a great solution for preventing
                                                                              data loss, but the reality is that there are a lot of
                       Much of the time when data is lost, it’s not due to    different hardware specs out in the real world,
                       a malicious attack but to human error. People lose     which makes deploying a single effective


                                                                                                                                      3
A Sophos white paper      How to protect your critical information easily




                       encryption method a problem. To deal with
                       this reality, you need a solution that will
                       assess computers during implementation
                       and automatically notify you of any potential
                       installation issues so you can take action before it
                       is too late.

                       And for confidential data that does have a valid
                       reason for being emailed to customers or partners,
                       you don’t want to deal with the hassle of building
                       a complex infrastructure, undergo painful software
                       installations or create time-consuming or confusing
                       processes for your users. Instead, you should seek
                       a gateway solution that will automatically encrypt
                       confidential information so that it is protected as it
                       heads across the internet to its recipient.


                       Conclusion
                       According to the Open Security Foundation, since
                       2000, the most prevalent types of data loss are
                       from stolen laptops (21%) and malicious attacks/
                       hacks (16%). So it’s clear there’s a problem. But
                       the cure shouldn’t be as complex as the problem
                       itself. Therefore, look for a solution that handles
                       external threats and malware; prevents data
                       loss; secures mobile data; and helps you comply
                       with policies and regulations. The ideal solution
                       will allow you to use these features separately—
                       although combining the four areas will give you the
                       solid yet manageable data protection solution that
                       you are looking for.




                       To learn more about how Sophos provides anti-malware and data protection in one
                       simple-to-manage solution, please visit:

                       http://www.sophos.com
                       http://www.sophos.com/products/enterprise/endpoint/security-and-control/




                                                                                                         4
A Sophos white paper              How to protect your critical information easily




                Boston, USA | Oxford, UK
                © Copyright 2009. Sophos Plc


                 All registered trademarks and copyrights are understood and recognized by Sophos.
                 No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any
                 form or by any means without the prior written permission of the publishers.

Weitere ähnliche Inhalte

Mehr von FindWhitePapers

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksFindWhitePapers
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...FindWhitePapers
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsFindWhitePapers
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceFindWhitePapers
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementFindWhitePapers
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseFindWhitePapers
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsFindWhitePapers
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesFindWhitePapers
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...FindWhitePapers
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...FindWhitePapers
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachFindWhitePapers
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchFindWhitePapers
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...FindWhitePapers
 
Asset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementAsset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementFindWhitePapers
 
All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...FindWhitePapers
 
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...FindWhitePapers
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessFindWhitePapers
 
Six Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemSix Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemFindWhitePapers
 
The ROI of Sustainability
The ROI of SustainabilityThe ROI of Sustainability
The ROI of SustainabilityFindWhitePapers
 

Mehr von FindWhitePapers (20)

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business Intelligence
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean Enterprise
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing Operations
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and Opportunities
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step Approach
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor Research
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
 
Asset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementAsset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset Management
 
All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...
 
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration Success
 
Six Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemSix Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid Them
 
The ROI of Sustainability
The ROI of SustainabilityThe ROI of Sustainability
The ROI of Sustainability
 
Making Strategy Real
Making Strategy RealMaking Strategy Real
Making Strategy Real
 

Kürzlich hochgeladen

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 

Kürzlich hochgeladen (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 

How to protect your critical information easily

  • 1. How to protect your critical information easily Safeguarding massive amounts of sensitive, confidential data—from legally protected personal information to intellectual property and trade secrets—from malicious attacks and accidental loss is one of IT’s biggest challenges. With employees having greater mobility than ever before to work outside the office, the job of protecting data has never been more difficult. Organizations must find a balance between protecting data and allowing it to flow easily around the business and between employees and partners. This white paper identifies the areas an effective strategy needs to address and describes how organizations can make data protection easy and cost-effective. A Sophos white paper November 2009r
  • 2. A Sophos white paper How to protect your critical information easily How to protect your critical information easily Summary time to complete and even sometimes never Safeguarding massive amounts of sensitive, getting done at all. confidential data—from legally protected personal • Other companies may choose to deploy information to intellectual property and trade multiple solutions addressing different aspects, secrets—from malicious attacks and accidental but not in a consistent way. This comes with loss is one of IT’s biggest challenges. Forrester its own problems. It affects the performance of Research says 288 million records were lost in computers and causes pain for IT with multiple management consoles, licenses and support the United States in 2008 and that 52% of the numbers to call. nation’s large organizations lost confidential data in 2007 and 2008. From a financial perspective, the The goal for an IT manager is to secure sensitive Ponemon Institute estimates each lost customer data without exceeding your operating budget record costs a business more than $200, with or overloading your team. This is an especially about $150 of that in indirect costs, including daunting challenge when data is on the move. abnormally high levels of customer turnover. That Sending data via email, putting it on a USB translates to an average organizational cost per thumb drive or burning it to a disk all increase the data breach of more than $6.6 million (Ponemon potential for malicious attacks or careless handling Institute LLC, “Fourth Annual US Cost of Data of sensitive information. Breach Study,” January 2009). Such breaches can damage a business’s reputation, destroy customer With that in mind, there are four key areas that IT trust and adversely affect the bottom line. should consider for building a solid yet manageable data protection strategy. You could approach each With employees having greater mobility than of these four areas in turn, but addressing them ever before to work outside the office, the job of all together will give you a comprehensive strategy protecting data has never been more difficult. whose whole is greater than the sum of its parts: Organizations must find a balance between protecting data and allowing it to flow easily 1. External threats and malware: Stop around the business and between employees and malware and hackers from maliciously stealing partners. This white paper identifies the areas an data and compromising your security. effective strategy needs to address and describes how organizations can make data protection easy 2. Complying with policies: Make sure that and cost-effective. users are adhering to the policies you put into place. Avoiding the usual problems 3. Preventing data loss: Stop users from being There are a couple of common approaches to careless with data. implementing data protection, which ordinarily end in pain: 4. Securing mobile data: Ensure that sensitive data can’t be compromised if users • Some companies may choose to implement a lose devices, while still allowing data to be dedicated data loss prevention (DLP) solution. exchanged among authorized users. However, this can often prove to be costly and hopelessly complex—often taking too much 1
  • 3. A Sophos white paper How to protect your critical information easily Protecting against external threats and It’s one thing to have all your policies neatly malware documented, but it’s an entirely different thing to get people to comply. Deploying a technology Today’s malware targets any data that can be solution enables you to enforce policies and sold—from financial information to blueprints. If monitor activity across your organization. This also it’s valuable, the bad guys want it. Stopping the helps you to prove that you are taking appropriate threats and keeping your network clean gives you action to protect the sensitive and confidential data a strong foundation on which to build your data on your network. protection strategy. Making compliance easy To stay ahead of these escalating threats, your When it comes to policy compliance, you need organization needs a solution that detects and to quickly create and deploy policies across your defends against known threats—preventing most organization. Plus, you need to monitor and from getting into your system in the first place— control the use of all your devices and programs, while also being able to effectively detect, block from USB storage devices and instant messaging and remotely clean up emerging, unknown threats. applications to email and web access and blocking Such comprehensive performance will give your the use of P2P software. So you should look for a business the advantage it needs in the battle comprehensive yet simple solution. Such a solution against malware and external threats. should identify specific devices to which data can—and cannot—be written. The result will be Stopping threats and keeping your network that you’ll protect your data without slowing the clean information superhighway down to the speed of a The first steps to ensuring your sensitive data is winding country road in the name of security. protected involve stopping threats before they cause potentially devastating damage and keeping your network clean. Look for a solution that Preventing data loss features proactive protection that detects known, An organization that has successfully implemented unknown and emerging threats. Such a solution a dedicated DLP solution is an exception to the will block malware from reaching the system in norm. Most businesses wrestle with this issue the first place. But if something malicious does and are unsure of the best way to attack the actually make it onto your network and attempt problem. For the vast majority of organizations, to steal data, your security will detect, block implementing a dedicated DLP solution is like and remotely clean it, ending the threat before it using a sledgehammer to crack a nut. begins. A better, more cost-effective approach is to integrate data loss prevention into the anti-virus Complying with policies solution your company is you’re already using. Regulations regarding securing confidential, Having a single endpoint agent that not only personal data continue to grow more numerous stops the external threats but also monitors the and more stringent. Retailers and healthcare movement of sensitive data keeps the organization providers are now joined by virtually every other protected while reducing the impact on system type of business that handles customer information performance. under the microscope of regulatory compliance for data security. One potential nightmare for an organization—and its IT manager—is a user who sends an email with 2
  • 4. A Sophos white paper How to protect your critical information easily confidential data attached and accidentally copies things, and that can compromise data security. an unauthorized, external recipient. Once he or she Each week, more than 12,000 laptops are lost at pushes the send button, that data is off to where it airports—that’s more than 600,000 laptops per shouldn’t go—unless your DLP solution features a year. Most are left behind at security checkpoints gateway that can identify that the data in question and up to 70% of those are never reclaimed, shouldn’t be sent to an external recipient and stops according to the Ponemon Institute (Ponemon the transfer before it is completed. That’s how easy Institute LLC, “Airport Insecurity: The Case of it would be if your anti-virus product could also Missing & Lost Laptops,” June 30, 2008). Further manage your DLP needs. exacerbating the situation, more than half of the business travelers surveyed by Ponemon said An integrated solution they store sensitive data on their laptops, and the An integrated endpoint agent should monitor all majority of those admitted they do not back up or of the common ways users can move data off secure that data. Encrypting the data significantly the network using various devices or programs— reduces risk. It enables employees to do their jobs removable storage devices, CD/DVD/floppy and helps your company avoid becoming another drives and internet-enabled applications such data-loss headline. as web browsers, email clients and even instant messaging. It also should offer varying levels of It’s easy to say, but is it easy to do? control so you can choose the one that works The best way to prevent data loss from mobile best for your business and help to educate your devices is to encrypt the files stored on them. users on the importance of protecting sensitive However, organizations need to share data in data. For example, you could choose the gentle the normal course of business and that’s where approach and have the product tell the user he or problems arise. It’s difficult to secure data on she is being careless with data. Or take a stronger removable media and share it as needed. You approach and block a user’s ability to place could ask everyone to use encrypted USB drives, sensitive information—such as a customer billing but that’s not always practical. The idea is to database—onto a USB drive or burn it to a CD. maintain mobility and productivity while protecting data and minimizing the impact on the end user, Also consider gateway protection to catch any so evaluate solutions that make it easy for users accidental attempts to send protected data to to secure data on any USB storage device— the wrong person. It will prevent disasters and otherwise they are more than likely to avoid doing keep that proprietary or confidential data where it it altogether. should be—within your company. Even if your organization’s employees don’t lose their laptops, some of them inevitably will forget Securing mobile data their passwords while they’re traveling and your Several solutions, such as encryption, are available IT team will get their SOS at any time of the day to protect data at rest on the network. But when or night. Look for a solution that delivers a simple data starts moving, it is at a much greater risk of way for users to recover passwords themselves being compromised or lost, whether it’s moving wherever they are—it will speed up the process for because someone is taking it off the network or them and avoid costly IT hotline calls. because it’s on the laptop of an employee who’s traveling. Encryption is a great solution for preventing data loss, but the reality is that there are a lot of Much of the time when data is lost, it’s not due to different hardware specs out in the real world, a malicious attack but to human error. People lose which makes deploying a single effective 3
  • 5. A Sophos white paper How to protect your critical information easily encryption method a problem. To deal with this reality, you need a solution that will assess computers during implementation and automatically notify you of any potential installation issues so you can take action before it is too late. And for confidential data that does have a valid reason for being emailed to customers or partners, you don’t want to deal with the hassle of building a complex infrastructure, undergo painful software installations or create time-consuming or confusing processes for your users. Instead, you should seek a gateway solution that will automatically encrypt confidential information so that it is protected as it heads across the internet to its recipient. Conclusion According to the Open Security Foundation, since 2000, the most prevalent types of data loss are from stolen laptops (21%) and malicious attacks/ hacks (16%). So it’s clear there’s a problem. But the cure shouldn’t be as complex as the problem itself. Therefore, look for a solution that handles external threats and malware; prevents data loss; secures mobile data; and helps you comply with policies and regulations. The ideal solution will allow you to use these features separately— although combining the four areas will give you the solid yet manageable data protection solution that you are looking for. To learn more about how Sophos provides anti-malware and data protection in one simple-to-manage solution, please visit: http://www.sophos.com http://www.sophos.com/products/enterprise/endpoint/security-and-control/ 4
  • 6. A Sophos white paper How to protect your critical information easily Boston, USA | Oxford, UK © Copyright 2009. Sophos Plc All registered trademarks and copyrights are understood and recognized by Sophos. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means without the prior written permission of the publishers.