is obvious that the solution to the
Posted: Thu Feb 13, 2025 6:30 am
Solution
Itproblem is not limited to any one system; a set of organizational and technical measures is required. The key link in this case will be a DLP system (a solution of the Data Leakage Prevention class, protection against data leaks).
The “method of counteracting” leaks actively promoted by a number of DLP vendors, the concept of which is based on the rule “identify the leak and punish the culprit”, will be absolutely unproductive in this model - no punishment of a negligent employee will cancel the fact of the leak and will not stop it - if the incentive is great enough.
In the above-mentioned example of the Sherlock leak, valuable usa whatsapp data information (video content) was stored in the organization's internal network in digital format. Access to such files inside and outside the organization should be limited to a limited number of users, which allows for the formation of a list (list) of authorized accounts and identifiers of mail accounts and messengers to limit the breadth of contacts of responsible persons.
Content analysis capabilities are usually very limited or non-existent in the case of video content, drawings, and graphic data. However, there are other characteristics that can help prevent such information from leaking: data format and size.
The solution to the problem of potential leakage in such a scenario will be, first of all, selective control of access to various information transmission channels and data storage devices for employees involved in the process of creating valuable content. Such control should include not only blocking of data transmission based on criteria defined by the information security service, but also detailed logging of permitted and prohibited attempts to transmit them, combined with prompt notification of the security service about such attempts.
Itproblem is not limited to any one system; a set of organizational and technical measures is required. The key link in this case will be a DLP system (a solution of the Data Leakage Prevention class, protection against data leaks).
The “method of counteracting” leaks actively promoted by a number of DLP vendors, the concept of which is based on the rule “identify the leak and punish the culprit”, will be absolutely unproductive in this model - no punishment of a negligent employee will cancel the fact of the leak and will not stop it - if the incentive is great enough.
In the above-mentioned example of the Sherlock leak, valuable usa whatsapp data information (video content) was stored in the organization's internal network in digital format. Access to such files inside and outside the organization should be limited to a limited number of users, which allows for the formation of a list (list) of authorized accounts and identifiers of mail accounts and messengers to limit the breadth of contacts of responsible persons.
Content analysis capabilities are usually very limited or non-existent in the case of video content, drawings, and graphic data. However, there are other characteristics that can help prevent such information from leaking: data format and size.
The solution to the problem of potential leakage in such a scenario will be, first of all, selective control of access to various information transmission channels and data storage devices for employees involved in the process of creating valuable content. Such control should include not only blocking of data transmission based on criteria defined by the information security service, but also detailed logging of permitted and prohibited attempts to transmit them, combined with prompt notification of the security service about such attempts.