Getting Granular: Why You Need Granular Access Controls

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration

In my last post, I said “Without granular access controls, you can’t prevent a user from copying data from a file and pasting it into an email, for example. If you only encrypt a file and do not prevent copy and paste or printing, a user can easily compromise security.” And I meant it. Now,  you might be asking yourself …

Your Sensitive Data is at Risk: How Do You Manage Insider Threats?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy

Picture it.  Your employees access sensitive and confidential customer information every day so they can do their jobs. Once the data leaves the protected confines of an information repository, file share or cloud-based service, your authorized users can share it with anyone, do anything with it and compromise your customer’s confidential information or your intellectual property.  As a result, you …