Professional Documents
Culture Documents
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Running Head: Case Study #2: Data Security & Data Loss Prevention 2
Introduction
As a new management intern at Padgett-Beale, I have been assigned to work with the Training
Team in the Office of Human Resources (T2) to help develop an internal training program for the
employees and managers. My second assignment is to develop a training module for data
security and data loss prevention that will be included in the training program for new hires and
apart of the employee Lunch and Learn seminars. My assigned topic for this training module is
“Data Security & Data Loss Prevention.” The topic was selected by several members of the
Padgett-Beale’s leadership team after some employees had confidential corporate data and logon
credentials stolen from their mobile devices while venturing outside of the network. Today, I will
be identifying and discussing five major issues that employees need to be aware of when it
Today, there are tons of ways that cyber adversaries can attack their victim but one way that
businesses tend to miss is attacks on their business through employees while they are away from
the office or while traveling. After working a long shift the last thing employees are worried
about is protecting the company’s confidential data while at a bar, sipping a cocktail and surfing
the internet. A lot of company give their employees company phones and computer that they use
when they are out of the office to give the employee mobility which adds an another way for
hackers to do what they do best. However, employees can face bigger threats when traveling to
other states and countries as some company’s fail to set up protocols and procedures to protect
confidential data while traveling outside of the office .Data security and data loss prevention play
a major in protecting valuable company data while traveling outside of the company network.
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Running Head: Case Study #2: Data Security & Data Loss Prevention 3
While venturing outside of the office it is important that employees only use the
company’s VPN to prevent access to the company’s confidential information. VPN provides an
encrypted, secure connection between any number of computers located anywhere in the world.
(Robinson, 2018) Implementing VPN technology will protect users from traffic interception
resulting in malicious attacks against the user or the company. Unlike public Wireless Fidelity
Alliance Inc. (Wi-Fi), VPN provides a secure tunnel that encrypts traffic making every
It is easy to tell employees to never leave their mobile devices unsecured but companies
have to be a bit some specific to help prevent data loss due to lost or stolen devices. Employers
must remind the employees to never leave devices in plain view in a car and hat a better practice
is to keep it with you but if you have to leave it in the car the trunk is a better option. Employees
should try to never let their mobile devices leave their sight and even at while working in the
office employees should keep their devices either lock away in their desk or office and should
not be left out in the open when they’re not in their workspace.
Mobile Device Management (MDM) plays an important role in securing data when
devices are lost or stolen. MDM is a security software that is used to manage and secure
employee’s mobile devices. (Beal, 2014) Employers must employ MDM solutions that will lock
and wipe devices when reported lost or stolen to prevent data theft. (Beal, 2014) Employees need
to be trained to use the various feature of such location tracking technology to keep track of their
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Running Head: Case Study #2: Data Security & Data Loss Prevention 4
Location trackers may need to be downloaded and activated on the device so businesses
can locate and recover missing devices. Tracking technology can help both the employee and the
Access Controls
Implementing role-based access control (RBAC) is important when trying to protect data
and prevent loss. RBAC acts as another layer of security to prevent unauthorized access to
business data. Employers have to decide which type of users need access to certain information
so they can assign roles and access permissions for each employees in the organization. All
businesses need to protect their investment by creating permissions that are allocated with just
enough access needed for employees to do their jobs because too much access to confidential
information has the potential to cause problems for the organization in the future. (Stor-Guard,
LLC, 2015)
Most companies have strict mobile use policies in order to prevent data loss and increase
productivity. Employees should only be allowed to use their corporate devices to make business
calls, check business emails or messages, and downloading productive apps that are approved by
the company. If employees are allowed to use their devices away from work they should use
secure tunnels like the VPN. It is important that employee understand that surf the internet or
social media accounts pose a major threat to data security and should be done on their own
personal devices. Some social media accounts like Facebook, Instagram and YouTube collect
personal information as the users provides them with or without their knowledge so users should
always limit personal use to prevent company data from being stored, shared or used by cyber
adversaries.
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Running Head: Case Study #2: Data Security & Data Loss Prevention 5
Conclusion
Overall, I have recommend five major issues that employees need to be aware of when it
comes to data security and data loss prevention. Today, protecting data is near impossible and
many large corporations with huge budgets for cyber security still fail at keep all corporate data
safe. Businesses need all the help they can get to keep confidential information safe from
adversaries and that includes soliciting the help of their employees. The employee have their own
responsibility to make sure they are not unintentionally putting the company at risk for attacks.
User carelessness result in hacker’s ability to commit fraud with stolen data so it is important for
employees to know how they can apply data security to prevent data loss. (Wolfberry, 2016)
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Running Head: Case Study #2: Data Security & Data Loss Prevention 6
References
Beal, V. (2014). MDM - mobile device management. Retrieved July 8, 2018, from
https://www.webopedia.com/TERM/M/mobile_device_management.html
Robinson, K. (2018, April 13). How Much Does a VPN Solution Cost? | AVOXI Cloud
Stor-Guard, LLC. (2015). Types of Access Control Systems for Effective Personnel Security.
systems-for-effective-personnel-security-43
Wolfberry. (2016). Digital foot printing. Retrieved June 30, 2018, from
https://www.wolfberrycs.com/digital-foot-printing/
This study source was downloaded by 100000847738536 from CourseHero.com on 06-06-2022 09:53:36 GMT -05:00
https://www.coursehero.com/file/35567323/Case-Study-2-Data-Security-Data-Loss-Preventiondocx/
Powered by TCPDF (www.tcpdf.org)