Components of a Solid Data Protection Plan
Components of a solid data protection plan
So what should enterprises do so as not to become the next victim of WikiLeaks (which now says it will start releasing corporate documents as well)? The most critical lesson to be learned by companies from WikiLeaks is this: trust your employees but verify that they are not doing something they shouldn't. The vast majority of your employees will be ethical but, every so often, you'll get one who isn't. These are the ones you need to protect against as best as possible (nothing is 100 percent secure or foolproof).
To create a solid data protection plan for your company, ask yourself the following questions:
1. Does your company have written policies in place to handle sensitive documents and have those policies been effectively communicated to your employees? If not, why not?
2. Are certain areas of data or files restricted?
3. Are automated tools in place to track document access?
4. Is the most sensitive data encrypted so it can't be exposed?
5. Are your employees aware of the penalties for unauthorized access or copying of files?
These are just some of the components of a data protection plan that companies must seriously consider. Not having one is like leaving your front door unlocked.
Of course, that doesn't mean you shouldn't also be protecting your assets from outside infiltration over the Internet. Clearly this is also a data leakage threat and there are many reported losses of data from malicious attackers. But most companies do a pretty good job of that already (although not all of them do) through the use of firewalls (for example, Cisco and Juniper) and effective segmentation of networks.
But few enterprises actually look at leakage protection as an "inside job" challenge. That is why it is critical that companies do more to eliminate this specific threat. I think that is the biggest lesson of WikiLeaks. If your company doesn't already have a "data leakage" prevention plan, what are you waiting for?
Jack E. Gold is the founder and Principal Analyst at J. Gold Associates, an IT analyst firm based in Northborough, Mass., covering the many aspects of business and consumer computing and emerging technologies. Jack is a former VP of research services at the META Group. He has over 35 years experience in the computer and electronics industries. He can be reached at firstname.lastname@example.org.