News

Industries

Companies

Jobs

Events

People

Video

Audio

Galleries

My Biz

Submit content

My Account

Advertise

Cybersecurity News South Africa

5 tips to identify and combat data loss threats

There are regularly stories in the media about companies that accidentally lose data, whether in printout or digital form. Usually, the security focus is on the prevention of external threats, such as viruses and hackers.
5 tips to identify and combat data loss threats

However, threats like leaks or the unauthorised distribution of secure content that may come from the inside are a potentially costly security breach that needs to be addressed.

Companies need to be able to identify and combat these threats and prevent the unauthorised release of paper and digital documents.

Lexmark South Africa has recommended five steps:

  1. Encryption: Hard disks in printers and MFPs can be configured to use encryption. This ensures all data sent to - and stored by - the printer or MFP is encrypted;

  2. Authentication: Having users authenticate themselves (with a PIN or employee card) and only releasing information ensures documents can only be collected by that individual. This can be augmented by security templates and/or automatic email address insertion for workflow and scanning;

  3. Monitor the flow of sensitive information: Implement a tool that monitors and audits the information that passes output devices to stop the unauthorised flow of sensitive information. This means creating a searchable digital image file of every document that is printed, scanned, copied or faxed (regardless of source). A secure content monitor will give an organisation the information needed to spot leaks and to establish a strong defence;

  4. Network device hardening: An unsecured printer or MFP connected to the corporate network can be a vulnerability that can be exploited by external hackers and internal threats. 'Hardening' these devices through techniques like port filtering and TCP connection filtering can make them resilient to network attacks; and

  5. A shredder: Once sensitive information is printed it's out of the hands of digital protection. A good-quality shredder can make sure that physical copies don't fall into the wrong hands once they're done with.

Protecting sensitive information remains a top priority for businesses. Lexmark has a range of solutions and elements that help organisations to keep a close eye on data - protecting it every step of the way.

Let's do Biz