Posted by Michael Skoupý, Last modified by Jiří Hošek on 19 June 2019 10:52 AM
Security issues simply and comprehensibly describe a company security status and of specific communication channels. Security issues and related recommendations are based on what data has been monitored in a company environment, what employee activities have been and what security rules have been set in Safetica. If security issues are not handled, they are a threat to sensitive data and to a workspace.
Security issues are available since Safetica 9.0 and are visible in WebSafetica console and Security Audit report.
How do security issues look like?
Security issues are color-coded accordingly to their status as follows:
Unresolved security issue
Any unresolved security issue poses a risk to a company and immediate attention should be paid to its treatment. For example, a security issue may arise in situations when there are insufficient or completely missing security policies in place to prevent leakage of sensitive data.
Example: 10 sensitive data files have been sent from your company by webmail services, which are not controlled by any security policy.
Treated security issue
If security measures are sufficient then a security issue is labeled as treated. However, continuous attention should be paid to the situation and regularly checked that the security settings are reflecting the company's current requirements.
Example: You have set security policies for webmail services and defined where sensitive files can be uploaded.
Hidden security issue
A security issue which company treats by different security tools can be hidden. This way only unresolved issues will appear and admin can focus on other important problems. Previously hidden issues can be again restored.
Example: 10 sensitive data files have been sent from your company by webmail services, which are not controlled by a security policy.
What are the types of security issues and how to treat them?
Security issues cover a number of areas, below are some of them.
Elementary measures are missing
The recommended basic measures include setting up immediate warnings or regular e-mail alerts. If a security incident occurs, a quick response through immediate warnings is important to minimize negative impacts. Responsible persons can therefore immediately deal with a risky issue. Also, a regular review of the company's security status via regular reports is an important part of the overall security strategy.
To improve your company's security, we recommend the following:
You can find out how to set up an immediate warning or regular e-mail reports in the Safetica documentation.
Missing identification of sensitive company data
Without understanding what company sensitive data are, it is not possible to create an effective security policies and prevent sensitive data leaks.
To determine what sensitive company data is, we recommend the following:
More information on how to identify sensitive company data can be found in the Safetica documentation.
Missing protection for a communication channel where sensitive data flow
Sensitive data can leave company through various communication channels such as USB flash drives, e-mail messages with attachments, websites, cloud storage, and others. Each communication channel represents a specific risk to your sensitive files and therefore, it is necessary to treat all communication channels. One of the most common methods of data leakage is, for example, transferring large volumes of sensitive files to a USB flash drive. It's a very easy and fast way for a company to lose control of its data. Subsequent loss or theft of a USB flash drive will result in critical data getting into the wrong hands.
To treat communication channels, we recommend the following:
Please refer to the Safetica documentation in order to set up DLP policies, restrict inappropriate channels, or create alerts.
Lack of restrictions for high-risk applications or websites
Understanding which applications or websites employees visit, helps companies to discover security risks and where to improve user productivity.
To reduce high-risk employee activities, we recommend the following:
How to reduce risky applications and websites can be found in the Safetica documentation.