4 Ps of DLP | Gamma Networks
Image of Gamma Logo

Blogs by Gamma

4 Ps of DLP | Gamma Networks

IT security is entering a new phase. According to a recent APWG phishing trends report, in the first quarter of 2019, phishing of SaaS and webmail services surpassed payment services. This is an important inflection point for the new industry when one must take stock of the emerging threats.

According to Verizon’s 2019 data breach investigations report, 34% of breaches involved internal actors. Finally, based on a data privacy survey by egress, The five most common technologies that have led to accidental data breaches by employees are:

- Email services like Gmail and Yahoo (51 percent)
- Corporate email (46 percent)
- File sharing services like FTP sites (40 percent)
- Collaboration tools such as Slack and Dropbox (38 percent)
- SMS/Messaging Apps like G-Chat and WhatsApp (35 percent)

IT leaders need to ask: "Is the new technology making it easier to leak sensitive information?" and "do I have the correct framework to deal with the data leak prevention?"

How do IT leaders approach the problem?

One way is to do what Microsoft did which according to a recent news is to ban slack and any applications that are deemed as less secure.

Another approach is to use the paradigm of defense in depth. Like the marketing 4Ps, we can think of DLP’s 4Ps as: Protect the data, protect the communication channel, protect the network and protect the infrastructure. In a SaaS world, one needs to focus on 2 P’s, protect the data and protect the communication channel, while the cloud provider takes care of the other two. Protecting the data starts with identification and classification of the data. Once data is classified and tagged then the next step is to block the data from leaking through the communication channels. Easier said than done. This is where Gamma can help.

Gamma’s Email Security uses machine learning & AI to automatically scan emails and attachments. It protects your email across Gmail, Office 365, Slack, and other SaaS applications. Gamma’s customizable email security warns users, notifies administrators and a lot more.

Image-social-engineering-png

7 Life-saving Tips About Social Engineering Attack | Gamma Networks

Social engineering attacks are carried out by "social engineers" who exploit the weakness found in every organization

Image-data-breach-png

Risk of Data Breach to Small Businesses | Gamma Networks

A data breach is the release of private information to an untrusted environment either intentionally or unintentionally

Image-security-culture-png

10 insights to help you build a culture of security and reduce risk | Gamma Networks

A culture of security is an organization-wide ethos that encourages employees to make decisions aligned with the organization’s security policies

Image-insider-threat-png

Insider Threat Is Your Worst Enemy. 9 Ways To Defeat It | Gamma Networks

Insider threats are defined as cybersecurity threats that come from within a company

Image-cloud-dlp-thumbnail-png

Spear Phishing | Gamma Networks

Spear phishing messages specifically address the victim, and disguise an entity that the victim trusts.

Image-4-p-dlp-thumbnail-jpg

4 Ps of DLP | Gamma Networks

The Leader in predictive people centric security. IT security is entering a new phase.

Image-cloud-dlp-thumbnail-png

Cloud DLP | Gamma Networks

The Leader in predictive people centric security. In today’s data world, data breaches are commonplace...