Encrypt your computers, emails and other devices
By encrypting your data, you can make sure that only authorized users with the appropriate encryption key or password can access the information. With encryption you can keep your data secure at all times, even if it is stored on a laptop, CD or other device that is lost or stolen, or if it’s contained in an intercepted email.
Use device and application control
Prevent users from accessing peer-to-peer file sharing and USB drives. These are common paths for data loss.
Only allow computers that comply with your security policy to access your network. This could include requirements for encryption, or device or application control technologies.
Block employee access to cloud-based mail services
Put controls in place to monitor or block employee use of cloud storage services such as Dropbox. These controls should include applying web-based URL filtering, application controls and data encryption. You can prohibit access and transfer of confidential information to largely unsecured cloud-based storage services.
Implement outbound content controls
Identify the sensitive data you want to control (e.g., any files containing the term "confidential" or credit card numbers) and then decide how these files can be used. For example, you may wish to present the user with a warning about potential data loss, or prevent distribution of the data by email, blogs or forums.
An encryption solution allows users to choose their preferred cloud storage services because the files are always encrypted and the keys are always your own. And because encryption takes place on the client before any data is synchronized, you have full control of the safety of your data.
User wireless encryption
Configure your office wireless networks to use strong encryption, such as that offered by WPA2. Encourage your employees to do the same on their home wireless networks.
Back to Safety Tips
Back to Threatsaurus Home