In today’s video, I’d like to show off the new USB activity dashboards introduced to AccessPatrol in version 7.0. I am the Digital Marketing Manager for CurrentWare. Click the button below to learn the best practices for protecting data during a termination and gain access to a downloadable IT offboarding checklist. These vulnerabilities need to be addressed as part of any insider threat management program. 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs. 72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer.88% of IT workers have stated that they would take sensitive data with them if they were fired.70% of intellectual property theft occurs within the 90 days before an employee’s resignation announcement.The employee offboarding process presents significant data security risks. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected. This prevents employees from using their privileged position to steal sensitive information such as trade secrets and personally identifiable information. One use of Data Loss Prevention (DLP) software is blocking the copying of files to a USB flash drive. Without proper access control measures stealing data is as simple as transferring it to a portable mass storage device such as a USB flash drive.įlash drives are capable of storing greater than 1TB of data, which is more than sufficient for exfiltrating databases, spreadsheets, design files, and any other intellectual property that needs to be protected. Your employees have intimate access to corporate data and knowledge of internal systems. Why Disable USB Ports? Prevent Data Theft
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |