Proactively Protecting Your Sensitive Data for Remote Workers

The unprecedented COVID-19 pandemic has, almost overnight, forced many organizations to modify their business practices and transition to a remote workforce. Of course, the first focus during this transition is deploying the connectivity and infrastructure necessary to support your remote workers. Don’t, however, lose sight of the fact that information scattered across a dispersed workforce can significantly raise the risk of a data breach or other adverse event.

At Sherpa Software, we regularly talk to IT, security, and privacy professionals across a broad portfolio of industries. As a result of those discussions, we’ve created the threat matrix shown below which outlines the areas of concern that we hear most often:

As a result of content being more decentralized, it is perhaps more important than ever to reassure your customers that their confidential information and intellectual property is secure even though your workforce is operating remotely. Sherpa Software’s Altitude platform is a valuable tool to help you achieve the remediation goals outlined in the Insider Threat Matrix graphic.

Altitude provides you with full visibility to any Windows workstation that has an Internet connection. By deploying Altitude silently using Microsoft SCCM — or a similar tool — your administrators can manage content being stored on each workstation. Here are just a few ways customers use Altitude to help limit the risk of insider threats:

  • Create specific folder hierarchies on each device. This strategy can help keep project files organized among team members and aid in the disposition of documents once a project has been completed.
  • Discover content on an employee’s workstation by examining meta-data criteria such as file name, type or age. Or open files and search through their content to uncover items containing specific information such as keywords, phrases, or patterns (Social Security numbers, customer information, etc.).
  • Apply retention rules (i.e., move/delete) to locally stored content based on established records retention guidelines. Or facilitate a data owner remediation approach where targeted content is identified automatically then presented to the data owner on a report where they can review each item and indicate the proper disposition step for each item.
  • Locate and manage email content that may reside in local PST files on the device, even when the PST file is open in Microsoft Outlook.

If you would like to see how Altitude can help you gain control over your remote workstation content, we are offering an opportunity to try our remote workstation monitoring for free for a limited time. To learn more, email us.