4. Enforcement of rights management
5. Limit the use of external storage devices
One of the most common ways to bring data out of an organization is to copy it to external storage devices. Today's USB drives are very cheap and easy to hide, and their storage capacity is increasing. Users can also copy data files to iPod or MP3 player devices, or to CDs and DVDs using a burner. To avoid this kind of data loss, you need to permanently restrict the installation of USB devices by removing all physical ports or plugging them in with a certain compound. In addition to the above physical measures, you can use the software to disable the use of external devices on personal computers or the entire network.
In Vista, you can restrict the use of external devices (such as USB or CD / DVD burner) via Group Policy. You can also refer to third-party products, such as Portable Storage Control (PSC) of GFI, for example.
6. Good control of laptops
Another way that users can take away important data files in your organization is to connect to your local network using a laptop or handheld device, copy files to its hard drive, then take the computer away. other places. To avoid this situation, you need to maintain strict control over the use of computers connected to the LAN, not only remotely but also plugged directly into the hub or switch in your network.
IPsec can be used to prevent computers that are not domain members from connecting to the file server and other computers on the LAN.
7. Set up guidelines for content sent
Firewalls can block traffic and do not send in or out of the network. They can also allow certain traffic to leave the network. Your data can be sent outside or it can be sent to a virtual door via email, peer-to-peer file sharing, etc. You can set up a firewall to lock out some types of outgoing protocols. , such as those used by P2P software.
It is possible to set up a mail server so that it blocks the sending of outgoing attachments. In addition, you can block content sent by keywords using content filtering devices, software or services such as:
8. Control wireless communication
Although it is possible to block the sending of certain data using firewalls or filtering systems, there are still people who can connect a company laptop to another wireless network. Or still someone can access the Internet using a mobile phone as a modem. To prevent these vulnerabilities, you need to strictly control nearby wireless networks, and, if possible, enforce their signal blocking measures appropriately.
9. Remote access control
Users may not necessarily be in the company to get your company data. With the popularity of remote communication and work on the road, they can fully access the corporate network through many remote access techniques.
10. Need to know the latest methods of data theft
Keep in mind that your data may be taken in different forms. Users can print out a document and take it out of the company, or a thief can steal printed documents from trash cans if they haven't been trimmed. Even if technology is implemented such as rights management to prevent copying and printing of documents, there are people who can use screen capture techniques or even sit and copy information manually. . Know all the ways you can take away your important data, from which you can take steps to protect against them.