He also notes that if earlier

Talk big database, solutions, and innovations for businesses.
Post Reply
rakhirhif8963
Posts: 531
Joined: Mon Dec 23, 2024 3:11 am

He also notes that if earlier

Post by rakhirhif8963 »

“The thinking of security specialists has changed,” says Lev Matveyev. “In the context of remote work, blocking the sending of certain documents (financial documents, restricted access information, personal data, etc.) has become critical. Therefore, developers have strengthened and expanded the types of blocking in DLP systems. Previously, blocking was implemented only for specific information transfer channels and specific applications. However, now insiders have access to hundreds of data transfer channels — zoom, skype, messengers, video conferencing systems, etc. Therefore, there is a need for technologies that are not tied to a specific application. We are noticing an increased demand for open APIs. Customers want to be able to customize products for their own unique business processes, for rare or custom software. Companies need seamless interaction of all components of the IT infrastructure.”

the topic of moving to the cloud was practically “taboo” for jamaica mobile database security specialists, now the use of cloud technologies is becoming the norm for many companies: “The Internet is becoming more reliable and end users have fewer and fewer questions about protecting cloud storage.”

Another trend: the growing popularity of information security outsourcing. “The trend for ‘information security as a service’ has long been visible abroad,” Lev Matveyev recalled. “It is coming to Russia late, but is developing rapidly. Now small and medium businesses are realizing that they cannot cope with data leakage problems on their own — they have neither the money nor the specialists with the necessary qualifications.”

What, where and how insiders most often leak
80% of companies believe that internal information security incidents are more dangerous than external ones, SearchInform analysts note based on their own research. These incidents can be caused by both deliberate actions and neglect of basic rules of "information security hygiene". Moreover, unintentional actions of employees are the cause of information security incidents more often than intentional ones.
Post Reply