Processes and procedures that prevent sensitive data from being sent beyond a secure boundary, like through email, instant messaging, or other applications.
There's a long list of disjointed security controls that may just work to increase your IT infrastructure complexity...
Fresh Security News. Right to Your Inbox.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.