123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Don’t Neglect Data Loss Prevention (dlp) For The Cloud

Profile Picture
By Author: Lauren Ellis
Total Articles: 35
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

There was a time when data loss prevention (DLP) efforts were focused on storage devices, email, and printing. However, now that you can take your device with you, in the form of a laptop or mobile phone, a lot more attention has been focused on devices themselves.

This makes sense as there are a ton of examples, from the US, but also from abroad of compliance fines for data that was lost via a laptop or mobile device. The mobile device management (MDM) industry has made significant strides in securing these mobile devices, which tend to get lost or stolen with almost no effort at all. But this leads to my fourth Cloud Data Security tip – look beyond devices and email and address DLP for the cloud.

The government can be relentless in prosecuting PCI, HIPAA, and HITECH compliance violations, regardless of how seemingly innocent the cause of the breach was. In both the examples hyperlinked above, the fined party lost the data because a laptop was stolen and the confidential data found within the device was not encrypted.

So, can you imagine ...
... how forgiving the government will be when a hospital uses Google spreadsheets to track patient information.

Not convinced this will happen to the cloud services you are using? Well it probably already has. For a beautiful and terrifying view into recent and remarkable data breaches, check out Information is Beautiful’s visualization of the worlds biggest data breaches. You’ll notice quite a few cloud services in there.

So what can you do? First you have identify all of the Cloud Security services your organization is using. Then you need to understand which data is going to which services. With this visibility you’ll be able to implement a targeted and realistic data loss prevention effort.

It doesn’t make sense to try and block or encrypt every piece of data going to every cloud service. So, you’ll want to use a trigger-based DLP process that identifies personally identifiable information, financial data, or confidential data that is heading to or living in the cloud. You’ll want the flexibility to either alert, encrypt, or block that data and you’ll want the flexibility to do this inline or offline.

Using this process, you’ll be able to prevent personally identifiable information (PII) and personal health information (PHI) from hitting the cloud unprotected – in doing so you protect your organization from IP leakage, compliance violations and fines, and the awful PR associated with being in next year’s annual data breaches report.

Author :
Lauren Ellis is a research analyst covering the technology industry’s top trends & topics, focusing on Cloud Security, Cloud Computing, data loss prevention etc.,

Total Views: 425Word Count: 453See All articles From Author

Add Comment

Computers Articles

1. How A Free Seo Checker Can Help You Understand And Improve Your Website
Author: Mahesh

2. "empowering Digital Excellence: Lcc Computer Education In Bhubaneswar"
Author: Khushi Gill

3. How Cat6 Ethernet Cables Improve Streaming, Gaming, And Downloads
Author: Jennifer Truong

4. Why Choose The 1452 Bluetooth Scanner In 2025?
Author: prime pos

5. Scraping Chipotle Menu Data From All Us Locations
Author: Food Data Scrape

6. The Rise Of Digital Marketing Agencies: A Deep Dive Into The Digital Marketing Landscape In Bangalore
Author: Cubikeymedia

7. What Are The Different Types Of Computer Cables?
Author: Jennifer Truong

8. How To Check If Your Business Idea Will Really Work?
Author: goodcoders

9. Boost Insights With Carfax Car Listing Data Extraction
Author: travel scrape

10. Cat6 Ethernet Cable: The Key To Faster Internet
Author: Jennifer Truong

11. Google Ads Company In Dubai: Realizing Business Growth With Webtek Digital
Author: webtek Digiytal

12. How To Troubleshoot Common Usb Cable Issues?
Author: Jennifer Truong

13. Why Melbourne’s Computer Shops Are The Best For Custom-built Pcs?
Author: Jack Williams

14. How To Manage Staff Productivity When Working Virtually?
Author: goodcoders

15. The Future Is Now – Top Digital Marketing Updates In 2025
Author: Gautam Khatnani

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: