A news story has hit the wires with the results of a survey that was done with USA and UK workers. 29% of US and 23% of UK employees would steal data from their employers if leaving the job, presumably to use it in a new job.
I’ve talked about the methods to prevent all of this before:
- Calculate the value of your data and the loss that will be caused if it leaks or gets into the hands of partners, customers or competitors. Use that risk value to budget your plans.
- Understand that this isn’t something a secretary or IT admin does. This is something that the information worker does. It’s more likely to be done by a senior person than a juinor person because they have more access to sensitive data, understand the data more, and have more to gain.
- User proxy controls to preven access to webmail and upload services. That’s only a slow down. Wifi services and mobile computing pretty much kill this one.
- Prevent access to removable media usign Group Policy and/or third party solutions. This is another slow down, rather than prevention mechanism.
- Implement real processes with data owners to authorise access to data and regularly review the granted access permissions. Prevent the usage of nested permissions because that’s when things do go wrong here. If the business doesn’t buy into this process (because they are too busy) then IT/security hasn’t a hope; this is business data, not IT data.
- Implement AD Rights Management Services to control who can view your data and what they can do with it, no matter where it goes.
- Encrypt your PC/laptop disks. Yes: PC’s too cos they can get stolen. Critical servers might be included in this as well. And look at solutions such as BitLocker To Go for removable media (if allowed) to force encryption on users.
- Forget Sandra Bullock clicking PI symbols or Keifer Sutherland running around with a perspex box full of circuitry. Physical security is key. If I can get to your server then I can get to your data. How hard is it to slid some disks out? Not very. Do you have sensitive data sitting on a server, in a broom closet (or under the reception desk) in a branch office?
- Audit, audit, audit. Use OpsMgr ACS, etc, to gather the logs. I have seen a case where a sales person was suspected of leaking customer data to his new employers. The client (a pharmaceutical multinational) did not have any auditing of any kind on their email or web proxy systems and could proove nothing.
- Work with local employment law experts with a specialisation in IT. One corporate right that applies in Canada or the USA, might not apply in the UK, and might get you sued (and lose) in Germany or Italy.
- Communicate that you are auditing everything that happens everywhere. Let people know that you’ll rip their heads off and squish their livlihood like a bug in a court of law if they are caught. Repeat this message regularly.
- Work as a team. There’s no point in the insecurity officer being all hush-hush when he suspects something. He has to work with IT to prevent a leak or investigate it because IT understand the systems – they also might be ordered by the person who is being investigated to help with the leak! I have seen this happen.
- Don’t be afraid of setting an example, especially if it is a senior person. Coverups don’t stay secret and don’t send out the required message of prevention.
That’s 5 minutes of thinking about this. Give me a bit more time and I’d have an entire data security strategy to keep a lid on things!