Corner Image

Vitrium Content Security and DRM Blog

Welcome to a world of content security, Digital Rights Management, and content tracking and analytics.

Get DRM Security Insights

Recent Blog Posts

Minimizing breaches with monitoring procedures

Dec 18, 2012 12:51:23 AM

Meeting the payment card industry's security requirements can be a challenge for organizations that don't take the proper precautions to keep highly sensitive information protected. Retail decision-makers, especially those at online-focused outlets, need to eliminate any security vulnerabilities by implementing advanced access management strategies that prevent unauthorized individuals from seeing sensitive resources.

A report by Dark Reading said decision-makers need to know their network infrastructure and understand where sensitive records are stored if they want to implement robust document protection tools. If executives don't know where confidential resources are, they won't be able to keep information safe from prying eyes.

Companies should consider requiring employees to record any access to sensitive documents.

"Logging is absolutely essential and people don't do enough of it," security expert Jerry Hoff said, according to Dark Reading.

Decision-makers should also think about installing document rights management and other identity and access control systems that monitor who views sensitive resources and tracks their activity. In doing so, organizations can minimize the possibility of inadvertently exposing confidential files.