{"id":32719,"date":"2021-04-29T10:35:02","date_gmt":"2021-04-29T08:35:02","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=32719"},"modified":"2021-04-29T11:02:30","modified_gmt":"2021-04-29T09:02:30","slug":"data-leak-prevention","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-dpo\/prevencion-de-fugas-de-datos\/","title":{"rendered":"Preventing data leaks Main security problem?"},"content":{"rendered":"<p>If we go back to a few years ago, in 2015, the <strong>United States Government <\/strong>suffered a<strong> data leak <\/strong>which affected a total of 4 million employees of the federal Administration. <\/p>\n\n\n\n<p>These types of incidents are among the<strong> more complex<\/strong>, given the diversity of consequences they can give rise to, the majority being triggered by human and organizational factors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tools and measures to prevent data leaks<\/h2>\n\n\n\n<p>For this reason, <strong>companies and organization<\/strong>They have a wide variety of tools and measures that effectively minimize and prevent the aforementioned leaks. Are<strong> measures and tools<\/strong> can be grouped into <strong>three different blocks.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-1024x683.jpg\" alt=\"\" class=\"wp-image-32726\" width=\"524\" height=\"349\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-1024x683.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-768x512.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-1536x1024.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-2048x1365.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-248x165.jpg 248w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-190x126.jpg 190w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencion-de-fugas-de-datos-medidas-scaled.jpg 1920w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>First block or technical measures<\/strong><\/h3>\n\n\n\n<p>Among these measures we can find the <strong>access and identity control<\/strong>, <strong>solutions&nbsp;<em>anti-malware&nbsp;<\/em>and anti-fraud, perimeter security and communications protection<\/strong>, other security measures derived from compliance with legislation, event management and security intelligence, among others.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Second block or<\/strong>&nbsp;<strong>organizational measures<\/strong><\/h3>\n\n\n\n<p>The actions that can be carried out are the following: establish a <strong>code of good practices, a security policy, information classification procedures, establishment of roles and access levels, training and internal information and information security management systems.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Third block or<\/strong>&nbsp;<strong>legal measures<\/strong><\/h3>\n\n\n\n<p>Legally, the following measures can be adopted: <strong>request for acceptance of the security policy, request for acceptance of the confidentiality policy, deterrent measures in accordance with the legislation and related to the adequacy and compliance with the applicable legislation<\/strong> (LOPDGDD, LSSI, LPIC, LPI, etc.).<\/p>\n\n\n\n<p>In this way, a<strong> strategy that effectively addresses the prevention of data leaks<\/strong> globally and covering both technical, organizational and legal measures, better known as \u201c<em>Data Leak Prevention<\/em>,\u00a0<em>Data Loss Prevention\u00a0<\/em>either\u00a0<em>\u201cExtrusion Prevention\u201d <\/em><strong><em>(DLP)<\/em>.<\/strong> In this sense, the aim is to ensure that critical information cannot be obtained outside of a company&#039;s network.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-1024x660.jpg\" alt=\"data leak prevention\" class=\"wp-image-32724\" width=\"525\" height=\"338\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-1024x660.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-300x193.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-768x495.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-1536x990.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-2048x1319.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-256x165.jpg 256w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/04\/prevencio\u0301n-de-fugas-de-datos-scaled.jpg 1920w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Data Leak Prevention<\/h2>\n\n\n\n<p>Likewise, this concept is used to<strong> describe the different types of software <\/strong>with which the administrator of a network can manage the information that users may transmit. <\/p>\n\n\n\n<p>With this software the <strong>Business rules<\/strong> through which the information will be classified and protected, so that unauthorized personnel cannot access it without prior authorization, both accidentally and voluntarily.<\/p>\n\n\n\n<p>Also, it is important to mention that there are <strong>several reasons that certify that DLP is much more secure than other technologies<\/strong> such as firewalls and <strong>IDS<\/strong> (<em>Intrusion Detection Systems<\/em>) either <strong>IPS<\/strong> (<em>Intrusion Prevention Systems<\/em>)<em>.\u00a0<\/em><\/p>\n\n\n\n<p>Thus, the main difference is that the <strong>DLP can identify the data, its typology, its classification and its content<\/strong>, following a series of previously established policies.<\/p>\n\n\n\n<p>Therefore, to conclude, we could say that when a company or organization adopts a policy of these characteristics with which <strong>safeguard against potential data leaks <\/strong>that may pose a serious risk to your integrity, your business model, your sales strategy or any other similar strategic policy, the first step to follow would be to ask yourself the following questions: <strong>what their needs are and what solutions would be satisfactory to solve them. <\/strong><\/p>\n\n\n\n<p>Once the above is clear, it is advisable \u00a0<strong>prioritize DLP systems<\/strong>, since<strong> allow us to continuously monitor<\/strong>, in addition to centralized management, which establishes clear requirements when making backup copies and storage, and that<strong> easy to incorporate into corporate systems<\/strong>, with additional features and known in the market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does studying a Master in Data Protection benefit?<\/strong><\/h2>\n\n\n\n<p>He <strong>General Data Protection Regulation<\/strong>, changes the approach to how to secure personal data by starting to study not only the data, but also its different treatments. This is carried out through a <strong>risk analysis.<\/strong><\/p>\n\n\n\n<p>The implementation of this new approach is not easy, studying a <strong><a href=\"https:\/\/eiposgrados.com\/eng\/master-direccion-compliance-y-proteccion-de-datos\/\" class=\"rank-math-link\">Master in Compliance and Data Protection Management<\/a>,<\/strong> will give you the necessary knowledge to understand the steps to follow to<strong> know, implement, maintain and optimize all the necessary security measures.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Preventing data leaks is very important, to do this you have to know the tools and measures that must be taken. We explain it to you!<\/p>","protected":false},"author":60,"featured_media":32724,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[368,330],"tags":[],"class_list":["post-32719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-blog-dpo"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/32719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=32719"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/32719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/32724"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=32719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=32719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=32719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}