Answer the question
In order to leave comments, you need to log in
What do you use to protect against information leaks?
Tell me what you use for windows, ubuntu desktop, mac os?
In terms of copy protection? Email or attachment?
Workplace control?
Answer the question
In order to leave comments, you need to log in
Тонкие клиенты, отключить доступ к внешним носителям и USB, запретить буфер обмена, разумеется никакого интернета из внутренней сетки, отбирать у сотрудников телефоны (особенно с фотокамерами), забить окна фанерой. По камере наблюдения на каждого сотрудника. Раз в неделю проверять всех на полиграфе.
A set of organizational and technical measures.
Technical - maximum restriction of user rights, media control, setting up anti-virus protection policies, password policy, setting up OS security policies, setting up network equipment (blocking ports, dividing users into groups, etc.). It all depends on each specific case, depending on the personnel, the security policy of the organization.
Organizational - again, it all depends on how well you want to defend yourself and, most importantly, from whom . There is already a lot of room for activity, but again it all depends on the organization.
It may be said off topic, but suddenly the idea will appeal: we had a client - IP Lesopilkin, let's call him that. Woodworking factory. For security purposes (fortunately, it's full of wood), all the USB ports in 30 computers were filled with wooden chocks =) Brutal but effective!
SMP with a storage horizon of six months. I really had to make a script on VBS. who would look for cars without agents. To control the installed software - 10-Strike. There is no Linux on the network, only I have it :)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question