Attempt to leak the local network topology - SearchInform

Attempt to leak the local network topology

02.03.2019

Back to blog list

Data encryption as a monitoring technique

The risk management department spotted one of the lawyers copying the document with the schemes of local networks and communication of the company to the personal flash drive.

Since the DLP system automatically encrypted the data which could not be accessed on PCs outside the network, the service continued monitoring in hidden mode. It soon became clear that a new lawyer deliberately wormed his way into the confidence of a system administrator and gradually collected data about the company's local network, storing it on the computer. His interest was unreasonable in terms of his work duties.

Moreover, the information that got into the hands of fraudsters could cripple the system of operational stock accounting. It would have taken many resources to restore it, not to mention the downtime losses. The company did not want to risk, and the suspicious lawyer was suspended from work.


Insiders can be detected before they upload sensitive information to their USB drives. As soon as an employee gets hired the monitoring system controls his or her activity as a team member. Security policies alert to abnormal events and communication concerning restricted topics.


 


Encryption Employee monitoring DLP


Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.

هل ترغب بالانتقال الى الصفحة الرئيسية,
او التعرف على المزيد عن الخدمات لمنطقة الشرق
الاوسط و شمال افريقيا؟
Do you want to visit main website
or learn more about MSS for MENA market?