FINAL WORD warnings , simple or daily fines and even the partial or total prohibition of the exercise of activities related to data processing .
This has caused processes to become more rigorous within companies and measures have been taken to increase access control in order to prevent leaks , which are related to ‘ Information Security ’.
And for these practices to be well applied , some steps can be taken , such as creating updated processes for software and systems , defining security policies , not allowing the use of pirated or unreliable programs , monitoring the infrastructure ; training professionals with good information security practices and frequently monitoring e-mails , documents , cloud and other information .
However , it is important to highlight that when access to this information is allowed , the responsibility for preventing leakage becomes is down to one more factor : ‘ Access Management ’.
The practice occurs when companies grant access without mapping the roles of professionals , mirroring profiles of other users , or even without examining whether the exercise granted may generate any risk for the business .
As a result of this action , employees may have permissions that are incompatible with the roles they perform and eventually take advantage of it .
It is very common to hear about data leaks that occurred due to a cyberattack , made possible by allowing external access to information .
www . intelligentcio . com INTELLIGENTCIO LATAM 71