<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you stop an employee emailing a sensitive document? in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51666#M3563</link>
    <description>&lt;P&gt;Realize that if I screenshot and/or put into a password-protected zip file, it becomes nearly impossible to apply technical measures to classify and protect as Intellectual Property without going scorched-earth.&amp;nbsp; Therefore, you also need to ensure you have written policy, disciplinary procedures and exec/HR buy-in to cover the cases where employees are actively attempting to bypass the controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the commonality of briefcases and work-from-home, you also need to decide if printing (at home or at the office) is an acceptable risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, consider solutions that encrypt the files in a way that they are unusable if accessed on a non-company (e.g. not domain joined) PC (or with an unauthorized account).&amp;nbsp; Then, you no longer need to&amp;nbsp; enumerate all the possible egress methods.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2022 18:02:41 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2022-06-21T18:02:41Z</dc:date>
    <item>
      <title>How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51642#M3549</link>
      <description>&lt;P&gt;How do you stop an employee sending a sensitive document through their personal email? Endpoint DLP is supposed to prevent such things, but when going into the details, the products that I've looked at seem to provide little or no protection to this route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have a product to suggest - what technical measures does it use to stop someone opening gmail and uploading the document?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:13:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51642#M3549</guid>
      <dc:creator>gidyn</dc:creator>
      <dc:date>2023-10-09T10:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51643#M3550</link>
      <description>&lt;P&gt;Web filters or web security gateways are another way to do it. It's not 100% perfect, as in there are ways around it just like DLP but the combination of the two would certainly be better than just one solution.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 20:06:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51643#M3550</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2022-06-20T20:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51644#M3551</link>
      <description>&lt;P&gt;Is there a reason you can't just block access to Gmail entirely? You can do this with NGFW or proxy (a.k.a secure web gateway) solutions pretty easily.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many will allow you to be granular with the actions users can take if you don't want to block access entirely. e.g. Users can login and read emails but not compose new ones, or compose new ones but not add attachments.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the company uses Gmail itself, then are you really asking how to differentiate between the company's Gmail and users' personal Gmail accounts? Google themselves have documented some options to achieve this, one of which is HTTP header insertion again using an NGFW or proxy:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.google.com/a/answer/1668854" target="_blank"&gt;https://support.google.com/a/answer/1668854&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 20:47:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51644#M3551</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2022-06-20T20:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51645#M3552</link>
      <description>&lt;P&gt;There are a few ways. The easiest way to remove Gmail is using a firewall or IPS with application control. They can still browse but will not be able to log in to Gmail. Some IPS solutions are smart enough to know if they are using the upload option, but there are still ways around it by using regular Gmail. You could still open up a file and cut and paste it. I would disable Gmail (All webmail) altogether. Cisco FirePower, I believe, has this function. Not cheap.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 20:53:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51645#M3552</guid>
      <dc:creator>steampunk</dc:creator>
      <dc:date>2022-06-20T20:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51646#M3553</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/843497849"&gt;@steampunk&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;There are a few ways. The easiest way to remove Gmail is using a firewall or IPS with application control. They can still browse but will not be able to log in to Gmail. Some IPS solutions are smart enough to know if they are using the upload option, but there are still ways around it by using regular Gmail. &lt;FONT color="#0000FF"&gt;You could still open up a file and cut and paste it.&lt;/FONT&gt; I would disable Gmail (All webmail) altogether. Cisco FirePower, I believe, has this function. Not cheap.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If the endpoint DLP isn't catching this, then network DLP should.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additionally, capabilities like user and entity behaviour analytics (UEBA) can identify users doing things like stealing intellectual property oftentimes more effectively than traditional DLP solutions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is all high-end capability though, so the appetite to deploy it depends on the value of your company's data and the assessment the company has made of the risks to that data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 21:32:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51646#M3553</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2022-06-20T21:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51650#M3555</link>
      <description>&lt;P&gt;You could consider looking at Proofpoint as an email gateway as it has DLP functionality built in, plus the capability to encrypt email in transit.&amp;nbsp; Secondly, classify your emails by sensitivity and provide awareness training around email security.&amp;nbsp; There is obviously the risk that employee may directly login to web mail clients and upload sensitive information so you either need an endpoint DLP product and/or to block all webmail.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 07:11:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51650#M3555</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2022-06-21T07:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51651#M3556</link>
      <description>&lt;P&gt;To those advising that I block Gmail or implement network filtering - perhaps I wasn't clear enough in the scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;An employee, who uses a laptop for work, takes it home (or to a public hotspot or wherever), with a sensitive file. Company policy allows this.&lt;/LI&gt;&lt;LI&gt;They log into their personal email, which could be Gmail, some boutique provider that you've never heard of, or something they host themselves with old-style web hosting. Nothing on the corporate network or mail gateway can see this.&lt;/LI&gt;&lt;LI&gt;They email the sensitive document as an attachment.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Employees must be allowed to take their laptops home (particularly during pandemics). The only solution I can think of is VDI, which is more overhead than corporate is prepared to invest in.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 07:30:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51651#M3556</guid>
      <dc:creator>gidyn</dc:creator>
      <dc:date>2022-06-21T07:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51654#M3558</link>
      <description>&lt;P&gt;You could put a proxy agent on the laptop for internet traffic.&amp;nbsp; And so long as you had administrative control of the laptop you could control what could be accessed.&amp;nbsp; It would be worth looking at removable media controls at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 10:14:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51654#M3558</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2022-06-21T10:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51656#M3559</link>
      <description>&lt;P&gt;There are many questions unanswered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Do the laptop users have admin privilege on the device?&lt;/P&gt;&lt;P&gt;2. Is gmail your corporate emails system?&lt;/P&gt;&lt;P&gt;3. Do you have any "Security" software on the devices?&amp;nbsp; Which ones?&lt;/P&gt;&lt;P&gt;4. What operating systems (which browsers do you allow or is it a free-for all)?&lt;/P&gt;&lt;P&gt;5. Do you have any DLP on the devices?&lt;/P&gt;&lt;P&gt;6.&amp;nbsp; Do you have any type of "content filtering software" on the devices?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also keep in mind, that confidential data can be stolen in other ways (hard copy, thumb drive), so you may have to implement Printing security software.&amp;nbsp; Additionally, you should disable either the CD drive or the thumb drive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are also things you can do to the data that will not allow a user to download (that is they can only see it or touch it at work).&amp;nbsp; &amp;nbsp;Check out:&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/office/prevent-users-from-downloading-content-from-a-site-98821ec7-cc99-4393-a002-f73370ba6694" target="_blank"&gt;https://support.microsoft.com/en-us/office/prevent-users-from-downloading-content-from-a-site-98821ec7-cc99-4393-a002-f73370ba6694&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would love to help you, so send along some additional information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 10:24:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51656#M3559</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2022-06-21T10:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51659#M3560</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;and others have said, it's installing a web proxy agent that filters back to either an on-prem filter or SaaS cloud filter. This is pretty much what every school in the U.S. does to keep kids safe when using school devices at home.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 12:00:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51659#M3560</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2022-06-21T12:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51660#M3561</link>
      <description>Putting all the replies together, it looks like I need some endpoint solution that can force all network traffic through a corporate filter (regardless of what network the user has connected to), and the filter will use its own certificate to intercept SSL connection. DLP should be able to work with the filter to prevent data leaks - I haven't actually implemented this in the past, but it sounds like a pretty basic capability.&lt;BR /&gt;&lt;BR /&gt;This just leaves finding an endpoint that can force this kind of proxying.</description>
      <pubDate>Tue, 21 Jun 2022 12:19:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51660#M3561</guid>
      <dc:creator>gidyn</dc:creator>
      <dc:date>2022-06-21T12:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51666#M3563</link>
      <description>&lt;P&gt;Realize that if I screenshot and/or put into a password-protected zip file, it becomes nearly impossible to apply technical measures to classify and protect as Intellectual Property without going scorched-earth.&amp;nbsp; Therefore, you also need to ensure you have written policy, disciplinary procedures and exec/HR buy-in to cover the cases where employees are actively attempting to bypass the controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given the commonality of briefcases and work-from-home, you also need to decide if printing (at home or at the office) is an acceptable risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, consider solutions that encrypt the files in a way that they are unusable if accessed on a non-company (e.g. not domain joined) PC (or with an unauthorized account).&amp;nbsp; Then, you no longer need to&amp;nbsp; enumerate all the possible egress methods.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 18:02:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51666#M3563</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2022-06-21T18:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51667#M3564</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/587599555"&gt;@gidyn&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;This just leaves finding an endpoint that can force this kind of proxying.&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Most any VPN/remote access software can do this.&amp;nbsp; "Split Tunneling" is a good search term.&amp;nbsp; Split tunneling is the act of sending most stuff to the company and allowing other stuff (e.g. SAAS services) to directly use the home-ISP for performance/capacity reasons.&amp;nbsp; Your goal is to set up split tunneling with most/all Internet destinations "hairpinning" through the company firewall and little to nothing splitting off locally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A home printer is an example of something that must be "split" if one wants to support it.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 18:13:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51667#M3564</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2022-06-21T18:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51669#M3565</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Most any VPN/remote access software can do this.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Most VPN software won't prevent the user from making non-VPN connections. That's what's needed here, prevent them from making any network connections that don't go through the VPN. Or maybe I'm just not familiar enough with what's available?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 18:50:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51669#M3565</guid>
      <dc:creator>gidyn</dc:creator>
      <dc:date>2022-06-21T18:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51671#M3566</link>
      <description>&lt;P&gt;Based on my experience, you'd have to enforce the use of a proxy via group policy to your company firewall in conjunction with VPN software to prevent any non-vpn connections or Internet access. If your firewall has a built in IPS to provide layer 7 content filtering, that could serve as your filter to prevent email access that's not specifically allow-listed. If it wasn't enforced by a proxy GPO, you'd have to enforce a full tunnel instead of hairpinning to catch all of the traffic but I'm not sure that's possible alone with just the remote access software.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that's assuming all of your devices are using Windows. The best way I've found for all OS types is via an agent to proxy traffic to a filter and MDM software to enforce device restrictions, e.g., app installs, certs for wireless networks, USB access, etc.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 19:47:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51671#M3566</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2022-06-21T19:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51676#M3567</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/587599555"&gt;@gidyn&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;To those advising that I block Gmail or implement network filtering - &lt;FONT color="#0000FF"&gt;perhaps I wasn't clear enough in the scenario&lt;/FONT&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;An employee, who uses a laptop for work, takes it home (or to a public hotspot or wherever), with a sensitive file. Company policy allows this.&lt;/LI&gt;&lt;LI&gt;They log into their personal email, which could be Gmail, some boutique provider that you've never heard of, or something they host themselves with old-style web hosting. Nothing on the corporate network or mail gateway can see this.&lt;/LI&gt;&lt;LI&gt;They email the sensitive document as an attachment.&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, this is a very different set of requirements than those you originally described.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;SPAN&gt;Employees must be allowed to take their laptops home (particularly during pandemics). &lt;FONT color="#0000FF"&gt;The only solution I can think of is VDI, which is more overhead than corporate is prepared to invest in.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;As I questioned earlier, what value does your company put on their data, what is their assessment of the risks to that data given their current security posture, and how does that translate into a budget to secure that data appropriately?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are platforms out there that do exactly what you want (e.g. Security Services Edge solutions, or if you don't want cloud-hosted, on-prem NGFWs can deliver SSE capability as well), but they are not inexpensive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given what you mentioned about VDI solutions being more overhead than corporate is willing to invest, unfortunately these will likely be out of reach for you, so what security capabilities do you already have to help deliver against your requirements?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW - I appreciate this was last updated a year ago, therefore it may not be current, but it shows that VDI is not especially expensive:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.infusedinnovations.com/blog/secure-intelligent-workplace/microsoft-365-secure-intelligent-workplace/wvd-pricing-guide-windows-virtual-desktop" target="_blank"&gt;https://www.infusedinnovations.com/blog/secure-intelligent-workplace/microsoft-365-secure-intelligent-workplace/wvd-pricing-guide-windows-virtual-desktop&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wouldn't personally recommend VDI solutions to deliver against a set of security requirements typically, but it makes me question, is the value of your corporate company's data really lower than ~$29 per user, per month? (Lowest price mentioned for 50 users is $1,433 per month.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it isn't, you need to approach your business leaders and look to educate them on core risk management principles, and setting appropriate budgets!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2022 23:11:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51676#M3567</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2022-06-21T23:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51678#M3568</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/587599555"&gt;@gidyn&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Most any VPN/remote access software can do this.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Most VPN software won't prevent the user from making non-VPN connections. That's what's needed here, prevent them from making any network connections that don't go through the VPN. Or maybe I'm just not familiar enough with what's available?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I am doing this today with the Gartner "enterprise network firewalls" magic quadrant leader.&amp;nbsp; And "disable split tunneling" was a feature in the other enterprise-grade firewalls we eval'ed.&amp;nbsp;&amp;nbsp;Its fundamental technique is sending default route over the tunnel and preventing users from reconfiguring/disabling the agent.&amp;nbsp; No proxy settings; it works 100% by manipulating the PC's routing table.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That said, I do confess that I have very little knowledge of the SMB markets, so I probably am speaking with "big business" blinders on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For what it's worth "disable split tunneling" is the magic incantation to use when discussing with your vendor.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 05:30:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51678#M3568</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2022-06-22T05:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51705#M3574</link>
      <description>&lt;P&gt;It is possible to classify a document as Internal Use Only and restrict access to that document to within the organisation only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've used Microsoft technology to do this for a while now but it's important to educate users in the application of the classification scheme.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can see when the classification has been amended to allow external transfer so there are some detective controls in place too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's a useful starting point to see what is possible:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/information-protection/what-is-azure-rms" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/information-protection/what-is-azure-rms&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/information-protection/rms-client/track-and-revoke-admin" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/information-protection/rms-client/track-and-revoke-admin&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other products are available which do a similar thing but here are the key things we have in place to reduce the risk:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Classify the information properly (and use tools to determine whether the classification has been correctly set - if possible)&lt;/LI&gt;&lt;LI&gt;Restrict access to webmail (gmail etc.) on company endpoints.&lt;/LI&gt;&lt;LI&gt;Restrict access to information that has been classified as for Internal Use Only so that it cannot be accessed outside of the organisation's environment.&lt;/LI&gt;&lt;LI&gt;Monitor/alert on classification adjustments.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 13:59:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51705#M3574</guid>
      <dc:creator>RichT</dc:creator>
      <dc:date>2022-06-24T13:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: How do you stop an employee emailing a sensitive document?</title>
      <link>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51734#M3579</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;and all.&amp;nbsp; Here is a prime example of and good use case of applying Zero Trust Security for protecting users and remote workers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An ideal migration to for example ZScaler with its capabilities and apply an SASE architecture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another approach would be to use Cloud services such as Crowdstrike, but the fact that the user is using using Gmail on a corporate owned system, then you have every right to apply agents to protect the organiation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 21:30:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/How-do-you-stop-an-employee-emailing-a-sensitive-document/m-p/51734#M3579</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-06-27T21:30:20Z</dc:date>
    </item>
  </channel>
</rss>

