<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>information protection - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/information-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/information-protection/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 03 Jan 2020 09:12:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>information protection - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/information-protection/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Classification: that essential aspect of data protection</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Sat, 12 May 2018 13:31:39 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Classification]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[information protection]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10765/</guid>

					<description><![CDATA[<p>Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">Classification: that essential aspect of data protection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Data is the 21st century’s black gold: an observation you won’t be particularly surprised to hear. The fact that it is ever-more exposed (through the increasing use of APIs and SaaS applications such as Office365, Salesforce, Shadow IT, etc.) and therefore at greater risk, won’t surprise anyone either.</p>
<p>The question is no longer whether data can leak (intentionally or not) and be misappropriated, but rather, how to secure it, and limit the impact when it does leak.</p>
<p>Against a backdrop like this, <strong>security models need to evolve</strong>. The <a href="https://www.riskinsight-wavestone.com/en/2016/05/levolution-modele-de-securite-chateau-fort-a-laeroport/">castle model is now largely outdated</a>, and is <a href="https://www.wavestone.com/app/uploads/2017/02/cybersecurite-directive-nis-union-europeenne.pdf">being replaced by that of the airport</a>. <strong>Data-centric protection</strong> then becomes an imperative. And such protection also has to <strong>meet the daily needs of those same users who worry about being affected.</strong></p>
<p>&nbsp;</p>
<h2>2 the different types of data &#8230; And the different approaches they require</h2>
<p>The large data-protection projects launched by major players all face the same problem: how to decide how sensitive a given piece of information actually is. The answer to this question is key: it’s this that determines the relevant level of protection needed to avoid data leakage.</p>
<p>Today, there are two broad types of data:</p>
<ul>
<li><strong>Structured data</strong>, which refers to all information that follows a particular format, and is easily identifiable as such: a CRM field, social security number, official certificates, and email addresses, as well as a host of other data that can be expressed in a clearly defined format (1). Typically, this information is found in the databases of applications.</li>
<li><strong>Unstructured data</strong>, which can exist in any format (such as MS Office documents, PDFs, images, videos, music, business application files, etc.). It should be noted that data which, at first glance, might be considered structured (for example, the telephone field of a CRM), may not be so if the format in which the data is entered is not followed strictly.</li>
</ul>
<p>Structured data can be easily identified, and its sensitivity assessed according to predefined norms; but unstructured data presents a problem of a whole different magnitude—and it’s mostly this type of data that employees generate day to day. In concrete terms, this translates into an inability of the relevant security tools (such as: Data Loss Prevention/DLP) to identify a leak or the misappropriation of vital information.</p>
<p>The classification of unstructured data, then, represents the cornerstone of any data protection strategy—and it&#8217;s something that has to be done manually by end users.</p>
<p>&nbsp;</p>
<h2>But what is classification?</h2>
<p>&#8220;Data classification&#8221; means <strong>the entirety of the technical and organizational processes used to categorize information produced</strong> by the employees of an organization. Following the categories defined – according to levels of sensitivity (for example, internal, confidential, secret, etc.) or by relevant organizational functions (such as HR, R&amp;D, Purchasing, etc.) – classification allows data to be placed within the appropriate regulatory, legislative, or security framework.</p>
<p>Historically very basic (for example, a checkbox in a header or on the first page of a document, or the manual addition of metadata), classification consolidates data, and makes users responsible, by placing them at the center of the process, while, at the same time, offering them an improved experience (a simple interface and clear advice).</p>
<p>In practice, classification tools offer a diverse range of functionality:</p>
<ul>
<li>For new files, either <strong>manual or automatically determined classification </strong>according to predefined rules (for example, the presence of a certain number of social security numbers);</li>
<li>For existing files, <strong>the manual scanning of files stored in local directories or on premises</strong>, according to predefined rules;</li>
<li><strong>The addition of metadata (or tagging) to the file</strong>: this metadata, which can be interpreted by third-party tools, unlocks visibility for supervisory tools such as Data Loss Prevention;</li>
</ul>
<p><strong>The addition of visual marking elements</strong> (such as headers, footers, and watermarks) to raise awareness among end users.</p>
<p>&nbsp;</p>
<h2>The results of classification projects have been inconclusive so far</h2>
<p><strong>RSSI procedures tend to take into account</strong> issues of data classification, and the issue is core to most major corporations’ policies. This <strong>imperative is reinforced</strong> by recent regulations such as the <a href="https://www.riskinsight-wavestone.com/en/2017/07/rgpd-1an-travaux-bilan-12/">GDPR</a> or the <a href="https://www.riskinsight-wavestone.com/en/2016/12/reussir-mise-conformite-loi-de-programmation-militaire/">French Military Programming Act (LPM)</a> which require the <a href="https://www.riskinsight-wavestone.com/en/2018/02/turn-records-management-business-asset/">mapping of data and uses</a>. <strong>However, few organizations, other than banks, have successfully implemented effective classification strategies.</strong></p>
<p>There are several reasons for this gap:</p>
<ul>
<li><strong>End users are generally not aware of the nature of the sensitive data or its impact</strong>: while the highest classification levels (&#8220;C4&#8221;, &#8220;Secret&#8221;, &#8220;Confidential&#8221;, etc.) are used for documents likely to put companies, or even entire Groups, at risk; these usually represent about 1% of all such information &#8211; although this proportion is close to 10% in some companies. Conversely, it is not uncommon for a user to share files containing sensitive personal data, or passwords, without any classification or protection.<br />
Thus, any data-classification project requires <strong>strong change-management support for end users</strong>. This should use clear messages and concrete examples, that allow users to classify information easily. Periodic recaps will also be needed to remind users what constitutes good practice. In fact, a user who handles sensitive data—day in, day out, may no longer be aware of the impact of this data being compromised.</li>
<li><strong>If they fail to provide users with sufficiently ergonomic approaches</strong>, companies cannot expect solid results. Experience shows that checkboxes for classification levels on cover pages, headers, or footers are only rarely selected.</li>
<li>The classification of the entirety of a company&#8217;s data is a transformation project in its own right and requires <strong>strong commitment from functional and corporate teams</strong> if it is to be widely delivered. This commitment must be even greater if the classification strategy that has been defined impacts users (through obligations to classify documents, use encryption, etc.).</li>
</ul>
<p>&nbsp;</p>
<h2>Classification takes center stage again</h2>
<p>The topic is back, in force, with large corporates, driven by digital transformation programs—requiring the rethinking of data protection, and with the large players in the market—who are shaping their offerings around the subject. Some analysts, like Gartner, even foresee the consolidation of data-protection solutions into a single, classification-centric solution.</p>
<p>Awareness and ergonomics will need to be combined, if such approaches are to be successful and end users are to buy into the process. The two will need to work together – hand in glove.</p>
<p>&nbsp;</p>
<p><em>In a future article, we’ll be looking at how the market is evolving for historical security players, and how the implementation of an effective classification strategy can provide a springboard for new impetus in data protection.  </em></p>
<p>&nbsp;</p>
<p>(1) A regular expression is a string of characters that corresponds to a specific syntax. For example, a French phone number can have one of three formats: 0123456789, +33123456789 or 0033123456789.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">Classification: that essential aspect of data protection</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Company Identity: Digitalisation’s New Challenge</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/</link>
		
		<dc:creator><![CDATA[B3noitL4diEu]]></dc:creator>
		<pubDate>Fri, 04 May 2018 11:28:48 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[company]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[e-mail]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[image]]></category>
		<category><![CDATA[information protection]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10733/</guid>

					<description><![CDATA[<p>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/">Protecting Company Identity: Digitalisation’s New Challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cybersecurity is no longer a topic just reserved for new technology fans and experts. Today, cyber-attacks make mainstream media headlines. All cyber-attacks make an impact on the company’s image and therefore on the trust conferred on it. In addition to damaging the company’s image, cyber-attacks can carry heavy financial consequences, as we experienced this Summer during the WannaCry and NotPetya attacks that have generated a total of billions of euros in losses for companies.</em></p>
<p><em>To avoid these costly consequences, companies are clearly concentrating on securing their critical IT infrastructures, but cyber-attacks are not only targeted at network vulnerabilities, datacentres and workstations. Users, whether internal or external to the organisation, are a prime target. Attackers usurp the identity of the targeted organisation to trick users in order to carry out their misdeeds.</em></p>
<p>&nbsp;</p>
<h2>The Company’s Digital Presence: A New Risk Factor</h2>
<p>In recent years, companies’ <strong>digital transformation</strong> has been characterised mainly by <strong>exponential development of external communication via digital channels</strong>; means of communication have multiplied and become the privileged vectors of exchange and interaction, revolutionising the customer relationship and exchanges with partners. To remain closer to clients and partners companies promote the use of digital communication via:</p>
<ul>
<li>Emails</li>
<li>Instant Messaging</li>
<li>Institutional websites and Web applications</li>
<li>Mobile applications</li>
<li>Social networks</li>
</ul>
<p>These media are the company’s showcase allowing it to portray itself, to expose and to radiate its brand image, via its own graphic impact, elements of language and messages. They personify the company and therefore refer directly to its perceived value. In addition, digitalisation has made it possible to largely substitute the physical relationship by digital services, accessible at any time and anywhere in the world, via which the company gives access to its community as well as its products and services, boosting ever faster, simpler and customised interactions with the users.</p>
<p>This heightened digital presence has enabled companies to develop their communication and the accessibility of their services, using digital channels to represent the company directly and fly its brand image flag. But there is a flip side to the coin: <strong>this digital ubiquity increases the possibility for attackers to usurp the company identity for malicious purposes.</strong></p>
<p>&nbsp;</p>
<h2>Damaged Brand Image: the cyber-attack’s collateral damage</h2>
<p>During a cyber-attack using <strong>spoofing of the company&#8217;s identity</strong> as a vector, the attackers’ intentions can be varied:</p>
<p><strong>Some attacks aim directly to undermine the company’s credibility</strong>, to make the company appear incompetent, or to show the malicious group’s superiority imposing its antagonistic ideology:</p>
<p>Over the last few years, there have been cases of website defacing where the content of the pages has been changed to transmit false information and mock businesses in order to harm their image. In 2015, Lenovo paid the price when “hacktivist” group Lizard Squad attacked its website, redirecting visitors to photos of the attack’s protagonists. Attackers can also publish false information on a social network after stealing the Community Manager’s credentials. One defining moment of 2017 in France was the hijacking of the Ministry of Culture’s Twitter account by a joker distilling various abusive tweets. For the companies affected by these attacks, the <strong>financial consequences are as expected</strong>: following these events and announcements, the <strong>repercussions on sales and stock market value</strong> are always accompanied by <strong>a heavy impact on brand image</strong>.</p>
<p>In other cases, <strong>the attackers divert the company’s identity, this time seeking to steal money</strong>. In this case, the attackers pass themselves off as the company in order to commit frauds aimed directly at tricking the users:</p>
<ul>
<li>The “<strong>President scams</strong>” are steadily increasing and allow attackers to divert large sums of money by misleading employees in finance to believe they have to execute an urgent transfer for a company director. In France, the total damage caused by this fraud is estimated at more than 400 million euros per annum.</li>
<li>Corporate employees are also the target of <strong>phishing campaigns</strong>, which can trigger a viral load contained in an attachment or a link from a seemingly familiar email. The goal may be to deploy a Cryptolocker to demand a ransom, or to gain a gateway into the organisation&#8217;s information system.</li>
<li>Companies are also affected indirectly when phishing campaigns use <em>their</em> domain name to send fake emails to customers asking them to update their bank information or other personal data that may have value.</li>
<li>The great novelty for collecting client data is via <strong>fake mobile apps</strong> imitating a legitimate application by their logo and interface but acting as a spyware when installed on the user’s smartphone. For example, a false WhatsApp application integrating malware was downloaded more than 1 million times on the Google Play store in October 2017.</li>
</ul>
<p>In a digital world where customer confidence, increasingly sensitive to cyber subjects, is easily lost, <strong>protecting brand image has become a major issue for businesses</strong>, alongside protecting their IT infrastructure and data. But what are the best practices to put into place to limit these risks of usurpation?</p>
<p>&nbsp;</p>
<h2>Dedicated Solutions and Organised Monitoring for better protection</h2>
<p>A company’s brand image protection of necessarily passes through the protection of digital communication channels. Depending on the type of channel, different action can be taken:</p>
<ul>
<li><strong>Names of websites, email addresses and social network accounts similar to those of the company need to be monitored</strong>. This practice is recommended by the ANSSI (French Information Security Agency) to combat the brand usurpation, as well as the monitoring of the &#8220;Dark App Store&#8221; offering users pirated and potentially malicious versions of enterprise mobile applications.</li>
<li><strong>Carrying out regular audits and vulnerability scans on institutional sites and mobile applications</strong> allows the identification of vulnerabilities that could provide entry points during a cyber-attack. The necessary corrective measures can then be implemented to secure these media especially against defacing.</li>
<li><strong>Implementing multi-factor authentication for email and social network administrator accounts</strong> reduces the risk of spoofing by simply stealing credentials. This greatly limits the risk of malicious content being published or shared, or theft of sensitive data accessible via mailboxes, as was the case in 2017 for the firm Deloitte. In this theft, more than 5 million e‑mails containing sensitive exchanges with their customers were stolen, following the theft of one of the administrator’s credentials</li>
<li><strong>Activating protection such as SPF, DKIM or DMARC protocols can prevent the spoofing of company email addresses</strong>. In fact, these protocols protect the company’s domain names by declaring the IP addresses legitimate for sending emails and implementing signature mechanisms for emails to certify them. These protocols ensure that the company&#8217;s domain name cannot be used from an undeclared server.</li>
</ul>
<p>Since digitalisation has favoured exposure of enterprise identities, cyber-attackers and hacktivists therefore take advantage to attack the companies and their ecosystem by posing as the company. In all these attacks and frauds, the attacker uses more or less complex means to usurp the company’s identity to attack and to weaken it. A damaged company brand image, for its customers but also for the general public, <strong>can cause financial losses of millions of euros, added to which are the huge losses that an attack crippling the company’s information system generates</strong>.</p>
<p><strong>The subject of protecting companies’ digital identity</strong>, in whatever form, <strong>needs addressed</strong> so that they can protect themselves against the frequent and costly usurpation of which they are victims.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/05/protecting-company-identity/">Protecting Company Identity: Digitalisation’s New Challenge</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
