News - Cetrom Information Technology, Inc.

Cetrom in Sprint Business Blog: Top 5 Data Loss Prevention Practices

Written by Emily Raines | March 28, 2017

This article originally appeared online in the Sprint Business Blog here.  By Christopher Stark, President and CEO, Cetrom on March 28, 2017.

  • Why your enterprise needs a formal security policy
  • How to enforce data security
  • 5 best practices for an enterprise data loss prevention and recovery policy

Despite all the bad cybersecurity news you see weekly – even daily – and despite all the clear risks, security unfortunately is still not a top concern for many businesses. But it needs to be.

Although every organization needs a security policy, there is no one-size-fits-all solution. Every company is different, with unique applications and a unique environment. So a policy to address data loss prevention and recovery must focus on the specific corporate needs.

It starts with the data you need to protect. Consider where your data lives, how it is currently protected, who has access to it and whether they are able to transfer the data, or cut and paste it, from different locations. How do you track the data once it leaves your environment either via email or remote access? How do you control who has access to it, when, and why?

To read the full blog post, click here.