Combating Data Breaches with Provisioning

Posted: April 8, 2010 in Posts, Rethink Remote Access

According to a recent Gartner survey, enterprise security end-users stated that remote access and user provisioning are two of the top 10 security technology priorities for 2010.  With 2010 well under its way, businesses have been gearing up and rethinking their remote access policies with provisioning in mind.  This is a key (and simple) strategy to deploy to prevent commonly overlooked data leakage issues.

All too many times do we see disgruntled employees and other internal mishaps occur within the workplace, so we thought it would be helpful to put together some best practices for you to follow:

  • Protect your data— implement proper security policies, such as the use of VPNs and two factor authentications.
  • Employee education—make sure all employees understand and follow all security procedures that are set in place.
  • Know your data and manage it—keep tabs on who is accessing what and when.

Rethinking your remote access and following these best practices are easy ways to reduce and prevent data leakage occurring within your business.

Comments
  1. […] in cases of missing laptops. A few months later, this number increased to 59%. In yesterday’s blog post, we mentioned the importance of implementing proper security policies, such as the use of VPNs and […]

  2. […] Combating Data Breaches with Provisioning […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s