Web Links Directory - Free human edited web sites directory  - Article Details
  • Active Links: 293839
  • Pending Links: 1287822
  • Todays Links: 0
  • Total Articles: 2460
  • Total Categories: 14
  • Sub Categories: 867

Enterprise Data Protection Delivering Security Without Disrupting Operations

Date Added: September 26, 2011 05:36:53 AM
Author: tier-3
Category: Business & Economy
Why DLP can’t stop insider threats Disgruntled or departing employees often steal confidential information out of spite or a misguided sense of entitlement. Stolen data are often customer details, prospect or price lists, marketing plans, new product details, financial information and IP. A recent Ponemon Institute study found that nearly 60 per cent of employees who’d lost or left their jobs took confidential information with them, including customer contact lists and other data that could end up in the hands of competitors. Of course, commercial gain is often a motive with insider fraud. In a recent example, US company Starwood (owner of Sheraton, Westin and Le Meridian brands) filed suit against the Hilton Hotel group after it hired a number of Starwood executives. According to the lawsuit, trade secrets were taken which Hilton used to develop its new Denizen Hotels concept. Starwood claims that the former head of its luxury brands group downloaded ‘truckloads of documents when printed’ on his laptop computer. Other times, when thieves target smaller amounts of specific information, their loss is more difficult to spot. According to last year’s Global Fraud Report, published by the Association of Certified Fraud Examiners, the financial services industry is at the highest risk from insiders: 80% of all fraud was attributable to people working in the accounting, operations, sales, customer service and purchasing departments of lender or financial services businesses. Why DLP won’t help Many IT security vendors have developed or acquired Data Loss Prevention (DLP) solutions which promise for data protection or deliberate removal of sensitive information. To use these systems (assuming you know where all your sensitive information resides) you first must classify it by degree of sensitivity and then keep the information updated as sensitivity changes over time. For many organisations, the set-up process is too complex and the ongoing operation too onerous. More to the point, ‘enterprises don’t know where their unstructured data is,’ says Nick Selby, head of enterprise security research at The 451 Group.’ Putting a box at the gateway doesn’t solve the (data loss) problem, but highlights it.’ Most importantly, insiders with privileged access will know these systems and how to get around them.
You must be logged in to leave a rating.
Average rating: (0 votes)

No Comments Yet.

You must be logged in to leave a Comment.
How to remove link from Wldirectory
Here is the short description, how to remove your link, if you no longer need it.
Get started with jewellery online shopping and find yourself many discounts and offers to avail
Today, Internet is the most versatile tools in the field of marketing. People generally uses it, as to advertise their business and products, as to attaing more and more money and also to get some merchandise.
Shared Hosting Cons And Professionals
Tie this to the fact that Bluehost offer a one month, full money back guarantee if you are unsatisfied for just about any cause. This would be particularly so as it pertains to multiple web hosting.of datacenters.
Monster Beats Headphones Outlet
A center channel is also included. When you are experienced enough, try your hand on starting your own recording studio.
Are you purchasing quality furniture?
When it comes to purchasing furniture you have so many places to choose from.