{"id":596,"date":"2022-04-12T16:02:06","date_gmt":"2022-04-12T12:02:06","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=596"},"modified":"2022-05-24T20:53:34","modified_gmt":"2022-05-24T16:53:34","slug":"data-leakage-prevention","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/data-leakage-prevention\/","title":{"rendered":"Data Leakage Prevention"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411050908{padding-top: 40px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text]Your data is your most important asset. Keep it safe. 80% of businesses experience a security incident every year. The average cost of a data breach is million. 2\/3 of small companies go out of business within 6 months of a major data breach.<\/p>\n<p>Your company runs on information. If your information gets leaked, it is almost inevitable that you<br \/>\nwill suffer financial loss, damage to your reputation or an increase in your competition.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1650997117117{padding-top: 30px !important;}&#8221;][vc_single_image image=&#8221;398&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411075187{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h4><strong>What Is The Most Important Data In Your Company?<\/strong><\/h4>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411093250{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221; el_class=&#8221;dataimp&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/id.svg\" alt=\"Safetica protection of employee personal data\" width=\"101\" height=\"101\" \/><\/div>\n<p style=\"text-align: center;\">Personal identification data<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/document.svg\" alt=\"Safetica protection of contracts\" width=\"102\" height=\"102\" \/><\/div>\n<p style=\"text-align: center;\">Contracts<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/company.svg\" alt=\"Safetica protection of sales data\" width=\"100\" height=\"100\" \/><\/div>\n<p style=\"text-align: center;\">Sales data<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/compasses.svg\" alt=\"&quot;Safetica\" width=\"102\" height=\"102\" \/><\/div>\n<p style=\"text-align: center;\">Engineering designs<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411110584{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221; el_class=&#8221;dataimp&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/idea.svg\" alt=\"Safetica protection of know-how\" width=\"100\" height=\"100\" \/><\/div>\n<p style=\"text-align: center;\">Know-how<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/people.svg\" alt=\"Safetica protection of Customer databases\" width=\"101\" height=\"101\" \/><\/div>\n<p style=\"text-align: center;\">Customer databases<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<\/p>\n<div class=\"span\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive aligncenter\" src=\"https:\/\/cdn.safetica.com\/web\/safetica\/images\/svg\/strategy.svg\" alt=\"Safetica protection of strategic plans\" width=\"100\" height=\"100\" \/><\/div>\n<p style=\"text-align: center;\">Strategic plans<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1653411139309{padding-top: 50px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text]<\/p>\n<h4 style=\"text-align: center;\"><strong>There Are Lots Of Ways To Lose Control Of Your Data<\/strong><\/h4>\n<p style=\"text-align: center;\">Ever sent an e-mail to the wrong person? Or lost a USB drive? Data leaks can certainly be accidental, but sometimes, even frequently, data is leaked on purpose. All it takes is one unsatisfied employee.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411168620{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221; el_class=&#8221;dataleakelist&#8221;][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">E-mail<\/h3>\n<ul>\n<li style=\"text-align: left;\">Attachments<\/li>\n<li style=\"text-align: left;\">Webmail<\/li>\n<li style=\"text-align: left;\">E-mail client<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Cloud<\/h3>\n<ul>\n<li style=\"text-align: left;\">Office 365<\/li>\n<li style=\"text-align: left;\">Google Drive<\/li>\n<li style=\"text-align: left;\">Box<\/li>\n<li style=\"text-align: left;\">Dropbox<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Hardware<\/h3>\n<ul>\n<li style=\"text-align: left;\">USB drives<\/li>\n<li style=\"text-align: left;\">Memory Cards<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Internet<\/h3>\n<ul>\n<li style=\"text-align: left;\">Web<\/li>\n<li style=\"text-align: left;\">p2p<\/li>\n<li style=\"text-align: left;\">FTP<\/li>\n<li style=\"text-align: left;\">Torrent<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Media<\/h3>\n<ul>\n<li style=\"text-align: left;\">CD \/ DVD \/ Blu-ray<\/li>\n<li style=\"text-align: left;\">Print<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411188682{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221; el_class=&#8221;dataleakelist&#8221;][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Mobile<\/h3>\n<ul>\n<li style=\"text-align: left;\">Mobile phone<\/li>\n<li style=\"text-align: left;\">Tablet<\/li>\n<li style=\"text-align: left;\">Laptop<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Social Media<\/h3>\n<ul>\n<li style=\"text-align: left;\">Facebook<\/li>\n<li style=\"text-align: left;\">Twitter<\/li>\n<li style=\"text-align: left;\">Google+<\/li>\n<li style=\"text-align: left;\">IM<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: left;\">Clipboard<\/h3>\n<ul>\n<li style=\"text-align: left;\">Drag &amp; drop<\/li>\n<li style=\"text-align: left;\">Screenshot<\/li>\n<li style=\"text-align: left;\">Ctrl+c\/Ctrl+v<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243;][\/vc_column][vc_column width=&#8221;1\/5&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411210966{padding-top: 20px !important;padding-bottom: 40px !important;}&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_btn title=&#8221;View More&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Fdemo.dedote.com%2Fcyberdisti%2Fsafetica%2F|title:Safetica|target:_blank&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1653411050908{padding-top: 40px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;3\/4&#8243;][vc_column_text]Your data is your most important asset. Keep it safe. 80% of businesses experience a security incident every year. The average cost of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-596","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=596"}],"version-history":[{"count":24,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/596\/revisions"}],"predecessor-version":[{"id":1240,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/596\/revisions\/1240"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}