Chapter 25. Preparing for the Future

In This Chapter

  • Re-examining implicit trust of employees

  • Spotting suspicious behavior in applications and users

  • Controlling data access by hiding what you don't want seen

  • Protecting against possible data loss through social networking

  • Preventing data loss in cyberspace

The trouble with data loss is that while the subject is as old as the hills, the consequences are only just being realized. It used not to be a crime to lose your laptop or to send an e-mail to the wrong person — but now it can put you on the front page of major newspapers around the globe — and not in a good way.

In the olden days of the Dark Ages — around 2006 — employees were trustworthy and honest (most of them); they had access to sensitive information and they were trusted to do the right thing with it. After all, what did they think they would do with it? Sell it? Ha!

Times, they are a-changin' — and now all information is valuable to someone. Corporate data, whether customer lists or company secrets, now commands a price on the black market if you know where to look. Malicious insiders are starting to make a name for themselves as threats. It's time to look at some of the futuristic technology — already here today — that can help combat the malicious insider. Here's why...

The Decline of Implicit Trust

One of the basic security strategies is authorization and authentication. Employees are granted access rights to applications and to data depending on their jobs or roles. Security ...

Get Data Leaks For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.