image credit: Freepik

Can Data Protection Systems Prevent Data At Rest Leakage?

May 13, 2021

Protection against insider risks works when the process involves controlling the data transfer channels or examining data sources.

One approach involves preventing USB flash drives from being copied or sending them over email. The second one concerns preventing leakage or fraud in which an insider accesses files or databases with harmful intentions.

What’s the best way to protect your data?

It seems obvious that prevention is the best way to solve any problem. In most cases, DCAP (data-centric audit and protection) and DAM (database activity monitoring) is sufficient. Both serve the purpose of protecting data at rest.

Read More on The Hacker News