Look over here! Here is a way to introduce anti-phishing drawings

According to the statistics: 80% of companies have taken place every year , large or small information leakage incidents, and there are quite a large a part of the drawing is related to leaks , especially in manufacturing, employees are intentional or unintentional leak caused .

.Png leak 

Therefore, internal anti-phishing company is the primary problem to be solved. How to protect the confidentiality of the work of drawing it, share several methods below , I hope all of you help.

1 , with the company's computer monitoring software, LAN monitoring software, the computer monitor screen, the user can manage online behavior, set access permissions for each employee, some companies also to sensitive operations (such as sending a file, copied to the U disk) be alert to remind the administrator can view at any time .

2 , using shared folders, each regular collection of storage engineers, designers, drawings, documents, centralized storage and backup timely. The one can guarantee that will not cause the destruction of the design, and secondly to ensure the company's centralized management and control drawings because the hard drive is damaged, do not quit because one or two people appeared all drawings leak. Important data (planning, design drawings, studies, etc.) for centralized management and access control , to authorize open, modify, download, copy and other rights based on the user's role. It can effectively address these important data from being illegally outsiders or insiders unauthorized access .

. 3 , the U- disk copy protection software copy prevention. Published in U on the visible disk file, using, copying does not go, only U review the use of the disk, the file will not get the U outside of disk use ; the user can use to set the date and time of publication frequency of use, thereby controlling the spread range information.

4 , the company developed a strict outgoing system, important drawings and other documentation needed outgoing, need to be sent in a single channel, and must be approved for the job, this can block the illegal outflow of other ways, too possible to prevent leakage of sensitive data.

5, the implementation of network isolation. Typically, many high-tech manufacturing or design institutes and research results of these drawings document the need to protect confidential business, there will be more comprehensive safety management system, many companies have "protect the core from the original" secure borders "Convert to data assets, "the idea up, quarantine outside the network is a good way, the internal data" trapped "within the network, but can be effectively shielded from external risks. On how to build a network isolation, it is recommended to see "isolate enterprise network construction Guide" this data, talking very comprehensive.

6, using a form of cloud desktop. Since most of the computer terminal used by designers, there are a lot of critical data, it is difficult to effectively manage the risk , if you use the cloud desktop, designers can prevent access to information, data copy does not go, this is an effective way of drawing the method of leakage. And cloud desktop costs will be lower, more unified management, enterprise scale is increased, you can quickly achieve the allocation of resources and expansion.

Network isolation .png FIG.

7, the use of encryption software drawings, drawings and other documents copied, the new, the system is forced to modify automatically encrypted. Encrypted files can only work properly with the unit inside the computer, once out of the unit within the network environment, use an external computer is garbled or will not open. This can effectively prevent internal staff active leak.

Drawings loss leaks far more than the general electronic documents. All in all, focusing on advance prevention .


Guess you like

Origin blog.51cto.com/14415391/2482139