File Operations that happened over the selected time period, including the number of files that have been copied/created, the number of files that have been deleted, and the number of files that have been renamed/saved as.In the overview dashboard you can review the following metrics: Having these metrics available at a glance makes detecting potential insider threats far more efficient as your organization scales.Īny groups or users that need to be reviewed further can be investigated using the more granular dashboards and AccessPatrol’s device activity reports.įor a more proactive approach to insider threat management you can set up targeted alerts that will notify designated staff members when these high-risk activities occur.įor the most up-to-date information on AccessPatrol’s activity tracking and data loss prevention capabilities, visit our knowledge base at /Support or visit the AccessPatrol product page at /AccessPatrol You can further refine how granular this data is by limiting the time frame, selecting only specific groups, and even investigating individual users. This device usage data is used to populate various graphs across AccessPatrol’s dashboards. and Mobile devices including smartphones, PDAs, and tablets.Portable storage devices such as USB flash drives, external hard drives, optical discs, tape drives, and SD cards.Today’s video is just a sneak peek of what AccessPatrol is capable of as time goes on you can expect to see further enhancements and data points added to these dashboards.Īt this time, AccessPatrol can track activities from the following peripherals: They work in tandem with AccessPatrol’s device control features and USB activity reports to protect sensitive data against the security risks of portable storage devices. These dashboards provide a convenient overview of the peripheral device usage of your entire workforce as well as specific groups or users-all from the convenience of a web browser. In today’s video, I’d like to show off the new USB activity dashboards introduced to AccessPatrol in version 7.0. I am the Digital Marketing Manager for CurrentWare. Click the button below to learn the best practices for protecting data during a termination and gain access to a downloadable IT offboarding checklist. These vulnerabilities need to be addressed as part of any insider threat management program. 50% of respondents in a Symantec survey say they have taken information, and 40% say they will use it in their new jobs.72% of CEOs admit they’ve taken valuable intellectual property (IP) from a former employer. 88% of IT workers have stated that they would take sensitive data with them if they were fired.70% of intellectual property theft occurs within the 90 days before an employee’s resignation announcement.The employee offboarding process presents significant data security risks. Employees have intimate access to corporate data, insider knowledge of the organization’s systems, and a level of trust that can allow them to steal data undetected. This prevents employees from using their privileged position to steal sensitive information such as trade secrets and personally identifiable information. One use of Data Loss Prevention (DLP) software is blocking the copying of files to a USB flash drive. Without proper access control measures stealing data is as simple as transferring it to a portable mass storage device such as a USB flash drive.įlash drives are capable of storing greater than 1TB of data, which is more than sufficient for exfiltrating databases, spreadsheets, design files, and any other intellectual property that needs to be protected. Your employees have intimate access to corporate data and knowledge of internal systems. Why Disable USB Ports? Prevent Data Theft
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |