Intelligent CIO APAC Issue 11 | Page 41

FEATURE : NETWORK SECURITY
Common sources of insider leaks
There are several ways in which data can be made unintentionally or unnecessarily accessible , and there are a number of measures to prevent this happening .
Most users want to make their job easier and won ’ t necessarily follow organizational policies covering how data must be handled . They will store files on shared or networked drives and may often be unaware of just how widely available their actions make those files .
As a result , it only takes one user ’ s account to be compromised for data to be put at risk – and that compromised user might have had no logical reason to have access to that data in the first place !
In the pre-cloud world , when most data was held on-premises , data access was more easily controlled .
Adam Gordon , Country Manager ANZ at Varonis
www . intelligentcio . com INTELLIGENTCIO APAC 41