This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Check Point claims positives of WikiLeaks incident are raised awareness of data loss and employee access

Share this article:

The WikiLeaks incident from last year highlighted the challenge posed to businesses when employees are given access to data that is above their grade.

In a roundtable discussion at the Check Point Experience in Barcelona, Check Point head of product marketing John Vecchi said that no matter what policy you put in place to stop data being copied, the WikiLeaks incident demonstrated the unenviable challenge for managers when it comes to access management.

Gabi Reish, head of product management at Check Point, said: “There is now increased awareness of data loss and preventing loss is a strategy, it is not about management and process, it is about involving all of the company and preventing all data loss. We need to educate and raise awareness and the one good thing about WikiLeaks is that raised awareness.

“Why do we lose data? It is because of unintentional mistakes on what is secure and not. A strategy of developing a product and using out-of-the-box policies is not good, rather it should be on what you want to block without asking the sender if they wanted to send or not.

“Check Point believes in an intuitive process of educating users and policy and gradually developing more and more on policies. Using technology as part of the policy helps raise awareness and with UserCheck you can raise the issue with the user.”

Speaking separately, Gil Shwed, CEO and founder of Check Point, commented that buying more weapons does not make you more secure, it is about how good your strategy is. “You need a straightforward strategy and the right measure to implement that, as most incidents start with a person making a mistake,” he said.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.

Hackers tap flaws in Amazon cloud to host DDoS botnets

Hackers tap flaws in Amazon cloud to host ...

Profitable and easy-to-use vulnerability exploited by cybercriminals says security researcher

China allegedly behind attack on Canadian research group

China allegedly behind attack on Canadian research group

One day on from claims that Chinese hacker group 'Comment Crew' was behind the theft of confidential documents on an Israeli missile defense system, the country is also being cited ...