{"id":5609,"date":"2021-09-07T19:32:36","date_gmt":"2021-09-07T19:32:36","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5609"},"modified":"2021-09-07T19:56:52","modified_gmt":"2021-09-07T19:56:52","slug":"data-loss-prevention","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5609","title":{"rendered":"Data Loss Prevention"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5609\" class=\"elementor elementor-5609\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d583e65 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d583e65\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50e80ba4 ot-flex-column-vertical\" data-id=\"50e80ba4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b13d0ae elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b13d0ae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-470c5619 ot-flex-column-vertical\" data-id=\"470c5619\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-689786a elementor-widget elementor-widget-iheading\" data-id=\"689786a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ DATA LOSS PREVENTION<\/span>\r\n\t        <h2 class=\"main-heading\">Protect Your Organisation From Data Misuse<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1dec3b97 ot-flex-column-vertical\" data-id=\"1dec3b97\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3f832476 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"3f832476\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4edf462 ot-flex-column-vertical\" data-id=\"4edf462\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0ec75a elementor-widget elementor-widget-image\" data-id=\"c0ec75a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/ext-768x432-1.jpeg\" class=\"attachment-large size-large wp-image-2409\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/ext-768x432-1.jpeg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/ext-768x432-1-300x169.jpeg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/ext-768x432-1-720x405.jpeg 720w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fe1f7b9 ot-flex-column-vertical\" data-id=\"fe1f7b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebc7da1 elementor-widget elementor-widget-text-editor\" data-id=\"ebc7da1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Despite the focus on malicious hacking, employee misuse of data was the cause of one in five security incidents, or the third most common cause, according to the Verizon Data Breach report (2015). Nearly half of employees admit to emailing work to their personal email accounts, and nearly one in five have given partners or customers sensitive corporate information without first checking with their manager.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6736a0a6 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6736a0a6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6e41639e ot-flex-column-vertical\" data-id=\"6e41639e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9429996 elementor-widget elementor-widget-text-editor\" data-id=\"9429996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong><span style=\"color: #ffffff;\">How Data Loss Prevention Technology Can Help<\/span><\/strong><\/h4><p>Data loss prevention is a mature technology designed to detect and if necessary, prevent the copying or transmission of sensitive information out of the corporate network. A comprehensive data loss prevention suite will look at data in different states and different locations, including:<\/p><ul><li>Traversing and leaving the network<\/li><li>On authorized and unauthorized endpoints<\/li><li>Data at rest, such as on file shares<\/li><li>Data in use such as being printed or viewed<\/li><li>Data in motion whether emailed, uploaded or copied onto removable devices.<\/li><\/ul><p>Implementing an effective data loss prevention strategy is much more involved than simply installing software and appliances into an existing network. However, not implementing an effective prevention strategy can result in a system that disrupts legitimate work processes and encourages users to circumvent controls.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c12a406 ot-flex-column-vertical\" data-id=\"c12a406\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd0c5d elementor-widget elementor-widget-text-editor\" data-id=\"bfd0c5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong><span style=\"color: #ffffff;\">Expert Data Loss Prevention Strategies<\/span><\/strong><\/h4><p>Through our experience designing and installing data loss prevention systems for our clients, DataSecure can:<\/p><ul><li>Classify different types of data, and understand the legitimate use of each<\/li><li>Assess the business risk of loss of different types of data<\/li><li>Prepare data usage policies for each type of data and business case<\/li><li>Implement a data loss prevention system to enforce the policy<\/li><li>Design ongoing monitoring and business as usual activities to maintain the solution.<\/li><\/ul><p>If you\u2019re struggling with an existing data leak prevention system or you would like to reduce the risk of employee misuse of data, contact us for an obligation free consultation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71608504 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71608504\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76489eeb ot-flex-column-vertical\" data-id=\"76489eeb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a81c090 elementor-widget elementor-widget-heading\" data-id=\"6a81c090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1e96b elementor-widget elementor-widget-heading\" data-id=\"b1e96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-132a2231 elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"132a2231\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ DATA LOSS PREVENTION Protect Your Organisation From Data Misuse Despite the focus on malicious hacking, employee misuse of data was the cause of one in five security incidents, or the third most common cause, according to the Verizon Data Breach report (2015). Nearly half of employees admit to emailing work to their personal email [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5609","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5609"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5609\/revisions"}],"predecessor-version":[{"id":5618,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5609\/revisions\/5618"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}