Data Loss Prevention

 

Data loss prevention (DLP) is the control of access to data that a company is responsible for (Comparitech, 2022). If you’ve ever watched the spy drama series, “The Americans,” you are familiar with how spy agencies single out and target people who have access to sensitive government or military information. In 2015, in an incident that sounds a lot like an episode of “The Americans,” the U.S. Office of Personnel Management (OPM) fell victim to a cyber-attack. State sponsored hackers working for the Chinese government stole extremely personal information to include: social security numbers, fingerprints, and highly sensitive information used for background checks (Todd, 2022). A data loss prevention (DLP) plan would have made the OPM data safe so that hackers weren’t able to intentionally steal or destroy the data.

A DLP policy defines rules behind how a company shares and protects its data. It prevents access to data from anyone who should not have access to it and guides how that data can be used in decision making. Unfortunately a DLP policy is not sufficient alone to prevent data loss, it needs to be coupled with additional software that physically secures, classifies, and tracks the data. One example of this type of DLP software is Solarwinds Data Loss Prevention with ARM. Solarwinds is an industry leader in IT monitoring tools (Comparitech, 2022). The Solarwinds ARM software supports the DLP policy by providing clear reports on set access permissions. This makes it possible to evaluate existing controls and to add better ones. The key features of this software include: auditing for data protection standards, access rights manager, automated responses, and spots suspicious activities.

Data classification plays a big role in DLP. One of the first steps in protecting data is classifying it in order to establish what access controls to apply to it. In the civilian world, there are four types of information classification (ISO 27001):

·        Confidential (higher up, senior management has access)

·        Restricted (most employees have access)

·        Internal (all employees have access)

·        Public information (everyone has access)

With these different types of information come different types of access and access control. In addition to these classification types, there’s additional control that can be added to company data, such as: PII, PHI, and ePHI (U.y., 2020). PII is personally identifiable information, or any information that can trace someone’s identity, name, social security number, date and place of birth, mother’s maiden name, or biometric information. PHI is protected health information, or personal identifiable health information. ePHI is electronic public health information, or PHI that is created, transmitted, received, or stored electronically (U.y., 2020).

The Economist declared data to now be the most valuable asset in the world, even ahead of oil. Wars have been fought over oil in the past, just imagine what types of wars can be fought on the cyber level to both protect and steal data. Data loss prevention and data loss prevention policies are becoming a necessity in daily business. A company without DLP prevention is like an army without any defensive measures: no armor, no reactionary defense systems, no ammo, etc.

 

References

10 Best Data Loss Prevention Tools & Software. Comparitech. (2022, March 31). Retrieved April 26, 2022, from https://www.comparitech.com/data-privacy-management/data-loss-prevention-tools-software/

Data analytics: Why data is your company's biggest asset. Reea Global. (2022, April 12). Retrieved April 26, 2022, from https://reeaglobal.com/why-data-is-your-companys-biggest-asset/

Establishing a data loss prevention policy within your organization. Digital Guardian. (2019, December 5). Retrieved April 26, 2022, from https://digitalguardian.com/blog/establishing-data-loss-prevention-policy-within-your-organization#:~:text=A%20data%20loss%20prevention%20policy%20defines%20how%20organizations%20can%20share,Identifies%20confidential%20data

Irwin, L. (2021, June 23). ISO 27001 & information classification. IT Governance UK. Retrieved April 26, 2022, from https://www.itgovernance.co.uk/blog/what-is-information-classification-and-how-is-it-relevant-to-iso-27001

Todd, D. (2022, March 24). Top 10 data breaches of all time. Cybersecurity Conferences & News. Retrieved April 26, 2022, from https://www.secureworld.io/industry-news/top-10-data-breaches-of-all-time

U.y. (2020, July 3). PII vs. Phi vs. ephi. Medium. Retrieved April 26, 2022, from https://informationsecurity.medium.com/pii-vs-phi-vs-ephi-3b1f6cfa91d0


Comments