Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Networking
    • Storage

    DLP Technologies Not Sufficient for Enterprise Without User Buy-In

    Written by

    Fahmida Y. Rashid
    Published February 3, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      CANCUN, MEXICO €” Companies invest in security to protect their networks and data. But sometimes, they are not thinking about the human side of the security equation, Kaspersky Lab researchers told attendees at the company’s security conference.

      The €œHumans are the weakest link€ presentation on the second day of the Kaspersky Lab Security Analyst Summit focused on protecting organizations from costly and devastating breaches that are often the result of user ignorance. Companies are implementing data-leak-prevention technologies without really considering how users should be integrated into the process. €œUser awareness€ was critical, Valery Boronin, research director of the Data Loss Prevention (DLP) group at Kaspersky Lab, told attendees.

      When customers evaluate data-leak-prevention technologies for their enterprises, they are looking for something that is easy to use, convenient, reliable and cheap, Boronin said. Instead, they wind up with platforms that are complicated, unreliable, expensive and inconvenient. He cited a Gartner report that found that organizations have difficulty understanding all the DLP options they have access to and wind up using a limited subset of available options.

      Instead of data-leak prevention, organizations actually wind up with data €œluxury€ protection, Boronin said.

      Even after deploying the most powerful DLP, encryption and other security technologies and hiring security experts, if the end-users don’t understand the threats or know the rules, all the money spent is wasted, according to Boronin. Security should be a process and not just a product, according to Boronin and Vera Trubacheva, a system analyst in the DLP group at Kaspersky Lab and co-presenter.

      End-users often do not know about information security policies, the threats they are protecting against and the mitigation technologies being deployed within the enterprise, according to Boronin. Recent surveys back him up, as users reported not being aware whether their organizations had any data-security policies, let alone what they were. Users are often the primary target in cyber-attacks, such as phishing and malware campaigns, and the attackers are succeeding because the users don’t understand the threats or the risks, according to Boronin.

      In a mock trial €œKaspersky Lab vs. DLP 1.0,€ Boronin and Trubacheva discussed how leaving out user awareness meant DLP alone was inadequate for protecting data within an organization.

      €œThe weakest link in security is not the technology,€ but rather, the human, Trubacheva said. She noted that users tend to select simple passwords, or select complex passwords that they proceed to write on a note taped to the monitor.

      Users need to be taught security basics, the policies and rules being implemented that they have to follow, and how they should respond when something goes wrong, Trubacheva said. The organization needs to be collecting information on what happened before and after the breach; that way they can make sure users are responding appropriately.

      Recent surveys from the Ponemon Institute have shown how expensive data breaches are to the organization. A lost notebook can cost an enterprise more than $50,000, according to the research group. The costs would have been dramatically reduced if the users had been taught to work with the appropriate tools and informed of policies, Trubacheva said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.