SlideShare a Scribd company logo
1 of 5
Download to read offline
12 Tips to Prevent your Sensitive Data Becoming a Wikileaks Headline
By David Ricketts Head of Marketing C24


Recent worldwide controversies surrounding confidential material being supplied to
unauthorized people and sites such as Wiki Leaks by anonymous whistle-blowers
should act as a catalyst for organisations across the globe to take control of data
governance and offer a guarantee that employees have access to only the information
they need.


In our experience we have found that employees responsible for the IT function are
finding it increasingly difficult, and in some cases impossible, to manage many elements
of data governance within their organisation. Below are some tips that explain the steps
that organisations in charge of permission management of employee data access need
to take to safeguard their data. By taking these steps, the IT function will be able to
understand who can access, who is accessing, who shouldn't have access, and who
owns the data, and remediate risk faster than traditional data governance and
classification methods.


At present, IT professionals – rather than the people that create the data (be it a
spreadsheet, PowerPoint presentation or company report) – are the ones making many
of the decisions about permissions, acceptable use, and acceptable access review.
However, as IT personnel aren‘t equipped with adequate business context around the
growing volumes of data, they‘re only able to make a best effort guess as to how to
manage and protect each data set.


Until organisations start to shift the decision making responsibility to business data
owners, it is IT that has to enforce rules for who can access what on shared file
systems, and keep those structures current through data growth and user role changes.
IT needs to determine who can access data, who is accessing it, who should have



                                                                                          1
12 Tips David Ricketts C24
access, and what is likely to be sensitive.


Here are the top must-do actions for the IT team‘s ‗to do‘ list, to carry out as part of a
daily data management routine for senior executives, to create a bench mark for data
governance:


1      Identify Data Owners
The IT department should keep a current list of data business owners (e.g. those who
have created original data) and the folders and sites under their responsibility. By
having this list ―at the ready,‖ they can expedite a number of the data governance tasks,
including access authorisation, revocation and review, and identifying data for archival.
The net effect of this simple process is a marked increase in the accuracy of data
access entitlement and, therefore, data protection.


2      Remove global groups and perform data entitlement reviews
It is not uncommon for folders on file shares to have access control permissions
allowing ―everyone,‖ or all ―domain users‖ (nearly everyone) to access the data
contained. This creates a significant security risk, for any data placed in that folder will
inherit those ―exposed‖ permissions, and those who place data in these wide-open
folders may not be aware of the lax access settings. Global access to folders should be
removed and replaced with rules that give access to the explicit groups that need it.


3      Audit Permissions Changes
Access Control Lists are the fundamental preventive control mechanism in place to
protect data from loss, tampering, and exposure. IT requires the ability to capture and
report on access control changes to data – especially for highly sensitive folders. If
access is incorrectly assigned or changed to a more permissive state without good
business reason, IT and the data business owner must be quickly alerted, and able to
remediate the situation.


                                                                                             2
12 Tips David Ricketts C24
4      Audit Group Membership Changes
Directory Groups are the primary entities on Access Control Lists (Active Directory,
LDAP, NIS, etc.); membership grants access to unstructured data (as well as many
applications, network gateways, etc.). Users are added to existing and newly created
groups on a daily basis.


5      Audit Data Access
Effective management of any data set is impossible without a record of access. Unless
you can reliably observe data use you cannot observe its misuse, abuse, or non-use.
Even if an IT department could ask its organisation‘s users if they used each data set,
the end users would be unlikely to be able to answer accurately—the scope of a typical
user‘s access activity is far beyond what humans can recall.


6      Prioritise Data
While all data should be protected, some data needs to be protected much more
urgently than others. Using data owners, data access patterns, and data classification
technology, data that is considered sensitive, confidential, or internal should be tagged
accordingly, protected and reviewed frequently.


7      Align Security Groups to Data
Whenever someone is placed in a group, they get file system access to all folders that
list the group on its ACL. Unfortunately, organisations have completely lost track of what
data folders contain which Active Directory, SharePoint or NIS groups. It is impossible
to align the role with the right data if the organisation cannot verify what data a group
provides access to.


8      Lock Down, Delete, or Archive Stale, Unused Data
Not all of the data contained on shared file servers, and network attached storage


                                                                                            3
12 Tips David Ricketts C24
devices are in active use. By archiving stale or unused data to offline storage or deleting
it, IT makes the job of managing the remainder simpler and easier, while freeing up
expensive resources. At the very least, access to inactive data should be tightly
restricted to reduce the risk of loss, tampering, or theft.


By automating and conducting the ten management tasks outlined above frequently,
organisations will gain the visibility and auditing required that determines who can
access the data, who is accessing it and who should have access.


     9 Review data entitlement (ACL)
Every file and folder in a file system system has access controls assigned to it which
determine which users can access the data and how (i.e. read, write, execute, list).
These controls need to be reviewed on a regular basis and the settings documented so
that they can be verified as accurate by data business owners and security policy
auditors.


     10 Revoke unused and unwarranted permissions
Users with access to data that is not material to their jobs constitutes a security risk for
organisations. Most users only need access to a small fraction of the data that resides
on file servers. It is important to review and then remove or revoke permissions that are
unused. IT should have the ability to capture and report on access control changes to
data - especially for highly sensitive folders. If access is incorrectly assigned or changed
to a more permissive state without good business reason, the data business owner will
be able to quickly identify and mitigate the situation by reporting the inconsistency to IT.




11     Delete unused user accounts
Directories may at times contain user accounts for individuals that are no longer with the
company or group. These accounts constitute a security hole. Those with a working


                                                                                           4
12 Tips David Ricketts C24
knowledge and access to user directories may retrieve information under someone
else‘s name. Organisations should routinely identify inactive users and verify that the
need for the account is still there.


12     Preserve all user access events in a searchable archive
Even for environments where the user-to-data permissions are current and accurate, it
is important to maintain a searchable archive of all user access events. This will help
organisations with triage and forensic analysis should data misuse or loss occur. IT
should be able to search on a username, filename as well as date of interest and any
combination thereof to ascertain who accessed what and how. This information can also
help expedite helpdesk call resolution.




What Are You Waiting For?
The biggest hurdle to overcome with this ‗to do‘ list is the amount of time conducting
these checks on a daily basis requires, if it is even possible! It is imperative that
businesses support their internal IT function by allowing them to utilise tools such as
Varonis so as to enable them to adopt best practice techniques so that they can
manage the business critical areas highlighted in this report.


If you would like further information about any of the areas highlighted in this report
please do not hesitate to call C24 or visit www.c24.co.uk




                                                                                          5
12 Tips David Ricketts C24

More Related Content

What's hot

Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for StorageSymantec
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection Pablo Junco
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecArrow ECS UK
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 

What's hot (20)

Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
 
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...What Are you Waiting For? Remediate your File Shares and Govern your Informat...
What Are you Waiting For? Remediate your File Shares and Govern your Informat...
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec Data Insight 3.0
Symantec Data Insight 3.0
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 

Similar to C24 Top 12 tips

Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Big data security
Big data securityBig data security
Big data securityAnne ndolo
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxketurahhazelhurst
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxchristinemaritza
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your DataEverteam
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfHome
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxvrickens
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writingOlatunbosun Obileye
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 

Similar to C24 Top 12 tips (20)

Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Big data security
Big data securityBig data security
Big data security
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docxChapter 3Data Management,Big Data Analytics, andRecords Ma.docx
Chapter 3Data Management,Big Data Analytics, andRecords Ma.docx
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
The Metadata Secret in Your Data
The Metadata Secret in Your DataThe Metadata Secret in Your Data
The Metadata Secret in Your Data
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
Data Security
Data SecurityData Security
Data Security
 
Security for Big Data
Security for Big DataSecurity for Big Data
Security for Big Data
 
IT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docxIT for Management On-Demand Strategies for Performance, Growth,.docx
IT for Management On-Demand Strategies for Performance, Growth,.docx
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writing
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
PCI Article C24
PCI Article C24PCI Article C24
PCI Article C24
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 

More from David Ricketts

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365David Ricketts
 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataDavid Ricketts
 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppDavid Ricketts
 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365David Ricketts
 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsDavid Ricketts
 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4David Ricketts
 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired documentDavid Ricketts
 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case StudyDavid Ricketts
 
C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insertDavid Ricketts
 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24David Ricketts
 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowresDavid Ricketts
 

More from David Ricketts (20)

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365
 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big data
 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3pp
 
Briefing - April 2016
Briefing - April 2016Briefing - April 2016
Briefing - April 2016
 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365
 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4
 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired document
 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case Study
 
Bi brochure v3
Bi brochure v3Bi brochure v3
Bi brochure v3
 
Bi24 brochure
Bi24 brochureBi24 brochure
Bi24 brochure
 
C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insert
 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24
 
Shoe Zone
Shoe ZoneShoe Zone
Shoe Zone
 
C24 Sandbox Insert
C24 Sandbox InsertC24 Sandbox Insert
C24 Sandbox Insert
 
Origin Enterprises
Origin EnterprisesOrigin Enterprises
Origin Enterprises
 
MPA Financial
MPA Financial MPA Financial
MPA Financial
 
MHA Care Homes
MHA Care HomesMHA Care Homes
MHA Care Homes
 
Arthur Terry School
Arthur Terry SchoolArthur Terry School
Arthur Terry School
 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowres
 

Recently uploaded

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 

Recently uploaded (20)

PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 

C24 Top 12 tips

  • 1. 12 Tips to Prevent your Sensitive Data Becoming a Wikileaks Headline By David Ricketts Head of Marketing C24 Recent worldwide controversies surrounding confidential material being supplied to unauthorized people and sites such as Wiki Leaks by anonymous whistle-blowers should act as a catalyst for organisations across the globe to take control of data governance and offer a guarantee that employees have access to only the information they need. In our experience we have found that employees responsible for the IT function are finding it increasingly difficult, and in some cases impossible, to manage many elements of data governance within their organisation. Below are some tips that explain the steps that organisations in charge of permission management of employee data access need to take to safeguard their data. By taking these steps, the IT function will be able to understand who can access, who is accessing, who shouldn't have access, and who owns the data, and remediate risk faster than traditional data governance and classification methods. At present, IT professionals – rather than the people that create the data (be it a spreadsheet, PowerPoint presentation or company report) – are the ones making many of the decisions about permissions, acceptable use, and acceptable access review. However, as IT personnel aren‘t equipped with adequate business context around the growing volumes of data, they‘re only able to make a best effort guess as to how to manage and protect each data set. Until organisations start to shift the decision making responsibility to business data owners, it is IT that has to enforce rules for who can access what on shared file systems, and keep those structures current through data growth and user role changes. IT needs to determine who can access data, who is accessing it, who should have 1 12 Tips David Ricketts C24
  • 2. access, and what is likely to be sensitive. Here are the top must-do actions for the IT team‘s ‗to do‘ list, to carry out as part of a daily data management routine for senior executives, to create a bench mark for data governance: 1 Identify Data Owners The IT department should keep a current list of data business owners (e.g. those who have created original data) and the folders and sites under their responsibility. By having this list ―at the ready,‖ they can expedite a number of the data governance tasks, including access authorisation, revocation and review, and identifying data for archival. The net effect of this simple process is a marked increase in the accuracy of data access entitlement and, therefore, data protection. 2 Remove global groups and perform data entitlement reviews It is not uncommon for folders on file shares to have access control permissions allowing ―everyone,‖ or all ―domain users‖ (nearly everyone) to access the data contained. This creates a significant security risk, for any data placed in that folder will inherit those ―exposed‖ permissions, and those who place data in these wide-open folders may not be aware of the lax access settings. Global access to folders should be removed and replaced with rules that give access to the explicit groups that need it. 3 Audit Permissions Changes Access Control Lists are the fundamental preventive control mechanism in place to protect data from loss, tampering, and exposure. IT requires the ability to capture and report on access control changes to data – especially for highly sensitive folders. If access is incorrectly assigned or changed to a more permissive state without good business reason, IT and the data business owner must be quickly alerted, and able to remediate the situation. 2 12 Tips David Ricketts C24
  • 3. 4 Audit Group Membership Changes Directory Groups are the primary entities on Access Control Lists (Active Directory, LDAP, NIS, etc.); membership grants access to unstructured data (as well as many applications, network gateways, etc.). Users are added to existing and newly created groups on a daily basis. 5 Audit Data Access Effective management of any data set is impossible without a record of access. Unless you can reliably observe data use you cannot observe its misuse, abuse, or non-use. Even if an IT department could ask its organisation‘s users if they used each data set, the end users would be unlikely to be able to answer accurately—the scope of a typical user‘s access activity is far beyond what humans can recall. 6 Prioritise Data While all data should be protected, some data needs to be protected much more urgently than others. Using data owners, data access patterns, and data classification technology, data that is considered sensitive, confidential, or internal should be tagged accordingly, protected and reviewed frequently. 7 Align Security Groups to Data Whenever someone is placed in a group, they get file system access to all folders that list the group on its ACL. Unfortunately, organisations have completely lost track of what data folders contain which Active Directory, SharePoint or NIS groups. It is impossible to align the role with the right data if the organisation cannot verify what data a group provides access to. 8 Lock Down, Delete, or Archive Stale, Unused Data Not all of the data contained on shared file servers, and network attached storage 3 12 Tips David Ricketts C24
  • 4. devices are in active use. By archiving stale or unused data to offline storage or deleting it, IT makes the job of managing the remainder simpler and easier, while freeing up expensive resources. At the very least, access to inactive data should be tightly restricted to reduce the risk of loss, tampering, or theft. By automating and conducting the ten management tasks outlined above frequently, organisations will gain the visibility and auditing required that determines who can access the data, who is accessing it and who should have access. 9 Review data entitlement (ACL) Every file and folder in a file system system has access controls assigned to it which determine which users can access the data and how (i.e. read, write, execute, list). These controls need to be reviewed on a regular basis and the settings documented so that they can be verified as accurate by data business owners and security policy auditors. 10 Revoke unused and unwarranted permissions Users with access to data that is not material to their jobs constitutes a security risk for organisations. Most users only need access to a small fraction of the data that resides on file servers. It is important to review and then remove or revoke permissions that are unused. IT should have the ability to capture and report on access control changes to data - especially for highly sensitive folders. If access is incorrectly assigned or changed to a more permissive state without good business reason, the data business owner will be able to quickly identify and mitigate the situation by reporting the inconsistency to IT. 11 Delete unused user accounts Directories may at times contain user accounts for individuals that are no longer with the company or group. These accounts constitute a security hole. Those with a working 4 12 Tips David Ricketts C24
  • 5. knowledge and access to user directories may retrieve information under someone else‘s name. Organisations should routinely identify inactive users and verify that the need for the account is still there. 12 Preserve all user access events in a searchable archive Even for environments where the user-to-data permissions are current and accurate, it is important to maintain a searchable archive of all user access events. This will help organisations with triage and forensic analysis should data misuse or loss occur. IT should be able to search on a username, filename as well as date of interest and any combination thereof to ascertain who accessed what and how. This information can also help expedite helpdesk call resolution. What Are You Waiting For? The biggest hurdle to overcome with this ‗to do‘ list is the amount of time conducting these checks on a daily basis requires, if it is even possible! It is imperative that businesses support their internal IT function by allowing them to utilise tools such as Varonis so as to enable them to adopt best practice techniques so that they can manage the business critical areas highlighted in this report. If you would like further information about any of the areas highlighted in this report please do not hesitate to call C24 or visit www.c24.co.uk 5 12 Tips David Ricketts C24