IT as a force for good – Security in your digital workspace


How technology can help against accidental data leakage?

 

This week an article caught my attention:

Somebody was able to steal an external disk. This disk contained backup data of autopsy reports related to the bombing on March 22th, 2016.  https://www.expatica.com/be/news/autopsy-reports-from-brussels-attacks-stolen-official-92660/

 

So, for me a  couple of questions raised instantly!

  1. How is it possible that he can just enter the office?
  2. How is it possible that the doctor could save sensitive data to a personal/external disk?

Both questions are about security!

The first one could be solved just by installing badge readers at the door and an automatic lock
And off course some common sense by just closing the door 🙂

The second question is more up my alley and talks about End User Computing.

 

How can technology help there?

Encrypt your data and tag it as confidential.

So if they want to move it to another location (cloud service, another disk, …) , it will be blocked.
And even if they can steal the data, it is still encrypted.

In Workspace ONE UEM this is a case of setting the correct policies to prevent “accidental” data leakage.

  • Data protection policy: Define your networks / applications / …
  • Enable / Enforce encryption on your Windows 10 devices
  • Set restrictions on the use of USB and Flash Cards.
    More information: https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/9.6/vmware-airwatch-guides-96/GUID-AW96-Profile_RestrictionsConfigWD.html

Another possibility is: Keep the data where it should be: in the datacenter.

There is an easy way to do that: use VDI and/or published combined with smart policies and conditional access to allow only approved access.

  • With Horizon and user environment manager you deliver a fully functional VDI or Published application where you access your data in a secure way.
  • In combination with Workspace One identity manager you add a layer of security with conditional access, SSO, MFA,device compliance … . The user will be granted access to any application based on his device, location, role.

So check out https://techzone.vmware.com for more information about Workspace One.

 


Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.