Data protection

Data in computers within computer networks is the most valuable Everything else can be relatively easily replaced The frequency and severity of information leaks has been recently increasing. What often seems like an accidental incident is often a result of arbitrary activity by internal or external workers of the organisation.

It is also good to focus on the following areas:

  • Data back-up – copying to an external storage or using a back-up program to back up all of your data according to the set parameters on a regular basis
  • Data encryption – refers to having the data transition into an illegible form and only revert to the original state after the corresponding password has been entered.

As a part of this protection, we try to implement systems that monitor (in-depth content inspection) and potentially block certain data flows in order to minimise the risk of data leaks (both intentional and accidental).

These systems are sometimes called DLP (Data Loss Prevention). This protection is predominantly engaged in protection of end devices (PC, notebooks, tablets and others), which are the basic working tools of employees and also the level where most leaks take place. Data flow monitoring at key points of the infrastructure is another important item. These are mostly places where data enters or leaves the company en masse (mail servers, proxy servers, etc.).

We recommend that you consider the following steps during DLP implementation:

  • Data leak risk identification
    Data leak risk identification and the related responsibilities should be collaborated on by IT specialists and people responsible for the company’s core business. The goal is to create scenarios which can be used for implementation of required measures.


  • DLP planning from network infrastructure functionality
    It is relatively easy and economically beneficial to utilise security mechanisms from the network infrastructure level. Vulnerability level reduction at the network level allows deployment of relatively easier rules at the application protection level.


  • Employee education in the area of DLP
    We make an effort to employ quality training and education in order to make users more observant with regards to risks posed, e.g., by sharing passwords, computers, transferring files between the home computer and business computer. Setting of clear constraints and user policies always results in reinforcing company culture.