What is Data Loss Prevention (DLP)?

Data Loss Prevention or DLP is the practice and usage of tools, technologies, and processes to detect and prevent data breaches and to ensure that sensitive data is not misplaced. This practice is to ensure that data is not lost or leaked illicitly outside of the organizational boundaries. Common data loss prevention processes and practices include alert systems, encryptions, filtering data streams, monitoring cloud data, monitoring and controlling endpoint devices activities. Data loss prevention practices also include reporting for legal liability protection, compliance, and auditing requirements.

Why is Data Loss Prevention Important?

Data loss prevention is important to ensure that intellectual property is protected and that data is not accessed by unauthorized users and maliciously used. Both internal and external users can be negligent or malicious to your organization.

With data loss prevention practices in place, an organization can prevent data breaches and protect valuable and sensitive information. Data loss prevention is also essential to be compliant with many legislations and regulations regarding sensitive data within an organization.

Those who violate these legislations and regulations are subject to harsh fines and legal liabilities that could obstruct the daily operations of a business or even cause a business to go bankrupt. Depending on the industry and region(s) a business operates in, there are different legislations and requirements that govern the protection and use of a business’ and its customers’ or patients’ data. 

Preventing Data Loss When Offboarding Employees


data theft prevention - a guide to offboarding employees - CurrentWare

The employee offboarding process presents significant data security risks. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected.

  • 70% of intellectual property theft occurs within the 90 days before an employee’s resignation announcement
  • 88% of IT workers have stated that they would take sensitive data with them if they were fired
  • 72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer
  • 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs

These vulnerabilities need to be addressed as part of any insider threat management program. Click the button below to learn the best practices for protecting data during a termination and gain access to a downloadable IT offboarding checklist.


Data Breach Incidents

There are many data loss related incidents from different industries that cost organizations millions of dollars, thus it is critical for organizations to protect their data both internally and externally. Some examples of organizations that experienced data breaches are the Korean Credit Bureau, Sage, and Waymo. The Korea Credit Bureau had the personal information of 20 million citizens stolen due to the negligent use of portable storage devices by an internal employee. Sage, a UK accounting and payroll company,  experienced a similar event where an employee stole personal information to use for fraudulent purposes. Waymo also experienced an internal data breach where an employee attempted to sell Waymo’s intellectual property on autonomous vehicles to one of their competitors called Uber. Data breaches have become quite common, in fact, during the year 2018 over 1200 breaches and over 440 million records have been exposed in the United States alone. Organizations can prevent data breaches using data loss prevention practices and tools that enhance the security of their data. 

Legislations and Regulated Data

Regulated data include but are not limited to, personally identifiable information (PII), protected health information (PHI), payment card information (PCI) and more. Councils and legislations regulate organizations that collect and store sensitive data such as the ones mentioned above. Examples of regulations and legislations that govern the way data is handled within an organization include Health Insurance Portability and Accountability Act (HIPAA), Personal Information Protection and Electronic Documents Act (PIPEDA), Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Regulation (GDPR). Data loss prevention practices can ensure an organization to be compliant with these regulations and protect the organization from fines and legal liabilities.

How to implement a Data Loss Prevention Strategy in my organization /
Data Loss Prevention Practices

In order for an organization to protect itself from data breaches, compliance policy fines, and legal liabilities, an organization must exercise data loss prevention practices. Here are some of the preliminary parameters an organization should define before considering data loss prevention solutions.

Type of Data being retrieved and stored: Before considering data loss prevention solutions, an organization must determine the content of the information they are handling to decide whether their data needs to be protected. Examples of data that require protection include intellectual property, financial data, trade secrets, PII, PHI and PCI. Knowing the type of data being handled will determine whether an organization’s information can be used maliciously or whether the organization is subject to any compliance policies, regulations, and liabilities. 

Where is the Data being stored: To implement data loss prevention solutions and to protect the data being handled, it is important to know where the data is residing. An organization’s data can be stored both internally and externally, it is important to identify the exact storage location of all sensitive information. Storage locations on-premises include databases, workstations, network drives, servers, and more. Examples of external storage include mobile devices (tablets, laptops, smartphones), portable storage devices (USB drives, external hard drives), file-hosting/cloud services (Dropbox, Google Drive, OneDrive), email, instant messaging channels.

Who is Accessing the Data: It is good practice to identify who has the authority to access the sensitive data and who is accessing data on a regular basis. Knowing exactly who, when, and where someone is handling the data will give an organization a better understanding of how to better protect their data internally from negligent or malicious employees. A few ways an organization can implement data loss prevention practices on its employees is through training and limiting activity or access.  In the event that an internal data breach occurs, an organization can investigate and take action on the incident more effectively.

Data Breach Recovery Plan: When your data has been compromised, corrective action must be taken. Having a data breach recovery plan in place is one of the most important data loss prevention practices that can help reduce the impact of a data breach and increase the chances of eliminating the threat entirely. Here are some of the common steps in a data breach recovery plan. 

removable media policy template mockup

Removable Media
Policy Template

  • Set data security standards for portable storage
  • Define the acceptable use of removable media
  • Inform your users about their security responsibilities

Get started today—Download the FREE template and customize it to fit the needs of your organization.

Data Breach Recovery Plan

When an organization has been attacked one of their first actions is to halt and freeze all operations in the organization to prevent the attack from spreading and impacting other areas. This can also help investigate the origin of the breach by eliminating the noise from daily operations.

The next typical step would be to ensure that all auditing and logging systems are still running for investigative purposes and to determine if it has been disabled by a malicious user.   

Another common action to take when there has been a data breach is to lock or change all credentials of all accounts involved with the data to prevent negligent/malicious users from doing further damage.

Once the data breach impact has been mitigated the next step is to take investigative action.  Firstly, the impact must be assessed in terms of what information was maliciously accessed and what databases or systems were compromised. Next is to investigate how the breach happened. Which accounts or credentials were used, what devices were connected to the network, did an employee act negligently with an unencrypted company device.

After the data breach investigation is complete, a solution to remedy and eliminate the breach is needed. This solution depends on the cause of the data breach and can include software updates, configuring firewalls, increasing information security, decommissioning a company device and more.

Data Loss Prevention Solutions – AccessPatrol and BrowseControl

AccessPatrol

One tool that is useful for implementing data loss prevention practices in your organization is CurrentWare’s AccessPatrol. This software helps to prevent the loss of intellectual property and other types of sensitive data by monitoring and controlling all endpoint device connections in all computers within your organization. The tool is designed to provide your organization with technology that can detect and restrict endpoint connections and endpoint activities on a computer or a user basis. AccessPatrol is a great data loss prevention solution for preventing the theft of data from malicious users and reducing the risk of negligence. By restricting unauthorized endpoint devices, AccessPatrol prevents malicious users from stealing sensitive information or upload malware onto your network. It is also great for data breach investigation with its auditing and logging reports functionality. 

BrowseControl

Another data loss prevention tool is BrowseControl with its web filtering functionality. BrowseControl can block access to unauthorized malicious websites within your network. Additionally, BrowseControl is capable of restricting access to file-hosting, webmail services and email applications such as Google Drive, One Drive, Dropbox, Gmail, Outlook and more. Blocking access to these services can prevent users in your network from uploading and sharing sensitive information from your organization to their personal external storage. BrowseControl adds another layer of security for your organization and data loss prevention practices by restricting your users from accessing harmful websites and storing sensitive data outside of the organization.

Give AccessPatrol and BrowseControl a try

Try out these Data Loss Prevention tools AccessPatrol and BrowseControl for free for 14 days

LEARN MORE

Sai Kit Chu
Sai Kit Chu
Sai Kit Chu is a Product Manager with CurrentWare. He enjoys helping businesses improve their employee productivity & data loss prevention efforts through the deployment of the CurrentWare solutions.