• Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events & Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Firewall
      • Managed SaaS Security

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring
      • Managed Email and Collaboration Security

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

Remember to Review Your Data Loss Prevention Policies

  • Written by: Dave Nelson
  • July 10, 2017
Animated Buildings Connected to the Cloud Graphic

Data loss prevention (DLP), sometimes referred to as data leakage prevention, is a security strategy used to prevent end users from sending confidential information outside the organization. This is not a new problem, in fact it may be one the oldest problems in civilization. The only difference is our mediums for storing and distributing sensitive information. Instead of sealing our hand written scrolls with a stamp and wax and relying on our most trusted couriers to make delivery, we are purchasing DLP solutions and encrypting emails.  

DLP Beyond the Technology 

DLP software can be incredibly valuable in protecting confidential data. It affords us the ability to classify data and create business rules that restrict unauthorized users from accidentally or maliciously sharing our most confidential information. However, the real issue may not be with the technology but rather with our data loss prevention policies and with whom we are entrusting our most sensitive information. 

Businesses are always striving to become more “efficient”, so they toss all of their data into shared folders and give global access to those folders. There are internal employees, contractors and vendors who often have unrestricted access to data they have no business controlling. The reality is that you can’t lose (or leak) data you don’t have. So, instead of relying solely on technology to help solve the problem, we challenge our clients to reconsider their data access policies and role definitions. 

Consider reviewing your DLP policies before implementing a technical DLP solution 

  1. Create and enforce a data classification policy. Classifying data, and then putting tighter controls around the most sensitive data, can greatly decrease the risk of data loss/leakage.
  2. Restructure access controls. Take a look at who needs access to data and why. This should be a routine process. As the business grows and matures, data access needs will change. 
  3. Consider modifying roles and responsibilities. It's possible that the duties which require access to sensitive data could be consolidated into one role versus spread across multiple roles. This will certainly reduce exposure of sensitive data. 

      What You Can Learn From a DLP Policy Review 

      You may find that by following these suggestions you've reduced your risk to a point that implementing a large, complex DLP solution is no longer a sound investment. Perhaps minimal DLP controls on your email and internet connections will be sufficient. On the other hand, after working through the steps outlined above you may find that you need to implement even more technical controls. You could consider controls such as restricting access to USB mass storage devices or adding encryption to individual files. Another option is to implement digital rights management (DRM) to files, which allows you to restrict the rights to open, modify, print, copy, email, upload or take other actions on restricted documents. 

      One thing is for sure. Businesses that implement DLP solutions without reviewing and updating their data classification standards and DLP policies haven't really reduced their risk. They've simply masked it. 

      IT Risk Assessment

      Related Content

      Employees Meeting in Conference Room

      10 Must-Have Information Security Policies

      These 10 critical information security policies are weak (or missing) in most organizations. Start improving your security with these must-haves.

      Learn More »
      Data Flow Diagram

      Why You Need a Data Flow Diagram—and How to Create One

      Data flow diagrams (DFDs) reveal risks, simplify complex systems, and enhance security. We’ll show you step-by-step guidance so you can create your own DFD.

      Explore More »
      Risk Matrix Likelihood Impact

      Risk Assessment: Likelihood and Impact

      Assess risk effectively with the risk assessment likelihood and impact matrix. This decision-making matrix assesses risk based on the likelihood and impact of threats in your organization.

      Read More »
      • Data Safety, Policies, Security
      Blog

      Connect:

      [email protected]  |  800.236.7914

      HBS logo

      HQ | 1700 Stephen Street
      Little Chute, WI 54140
      Locations

      HBS Remote Support | Service & Technical Support | E-Bill Portal
      Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
      ©2025 Heartland Business Systems. All rights reserved.

      Halo from HBS
      This chat may be recorded as described in our Privacy Policy.