Here’s a good piece of news for companies around the world: when it comes to access to your important and confidential data, you don’t need to treat all employees as equals. In fact, it is highly recommended to make sure not anyone can access all your files, and if they can see them, you should prevent everyone from copying or transferring the information you need to keep private.
Ongoing projects, customer data bases, inventions, strategies, private records of employees, credit card and bank account information, all these must remain confidential. So if you store them, how can you make sure an employee that is unaware of the harm they are doing or who knowingly wants to harm you, fails at their attempt to expose the files in question?
The feature that enables you to take control of who does what with your data is called File Whitelisting. Backed by file tracing, not only do you see who transfers what and to where, you also prevent anyone from copying or transferring documents classified as restricted to being viewed only. It keeps you safe and it also lets you know who tried to stick their nose where they were not supposed to. An effective endpoint security, device control and data loss prevention solution will certainly offer your company these seemingly simple, but very powerful features.
What’s the alternative? You might end up in the same situation as Chocolate Emporium who had their entire customer database being transferred by an employee via Dropbox. Yes, large files no longer discourage anyone. A simple flash drive or smartphone is enough to store all the information you value the most, in a matter of minutes. In the case of Chocolate Emporium, the employee knew what he was doing and took all the information on buyers he could find. But in some cases, there is no malicious intent. An eager employee that’s not educated in the ways of security my copy a similar database on his portable hard drive to work from home, to only find himself the victim of a theft. With the hardware also goes the information, which in most cases is unencrypted.
So keep your company safe instead of making up for the loss. It’s easy and effective. So why not try it?