Print Article

The critical data loss prevention practices you should consider


For every business, from large organisations to smaller start-up companies, DATA LOSS PREVENTION (DLP) measures are a crucial element of security that must be continually employed.

The aim of this process is to
  1. Fully understand how data is being utilised,
  2. knowing where data is being sent or has gone to, and
  3. whether this usage conforms to compliance policies such as the General Data Protection Regulation (GDPR).
The following are some of the best practices for DLP that can help you to protect sensitive company information from both external and internal threats.

Identifying and classifying sensitive information

When setting up systems to protect your company data, it is essential to know what types of information your firm stores and uses.

Making use of data discovery as well as data classification technologies can

  • help you control user access and
  • ensure sensitive data is not stored in unsecure locations.

All sensitive information should be clearly marked with its designated classification so you can make certain it is appropriately protected.

Data classifications can always be updated as required, but controls should be used to stop users from attempting to falsify classification levels.

Only users with top-level privileges should have access to downgrade data classifications.

Control access

Access Control Lists (ACL) can show who is authorised to access resources at different levels.

The ACL can be an application or an internal element of your operating system.

ACLs can use blacklists or whitelists as a basis that might contain websites staff are prohibited or allowed to visit, or software that can or cannot be installed.

The power of data encryption
  • Any business-critical data must always be encrypted both in transit and when stored.
  • To avoid loss of vital information and to defend against attacks, hard drives on laptops and computers should also be encrypted.
Safeguarding your system
  • Any areas where sensitive data may be located, even if temporarily, should always be secured and all potential access routes accounted for.
  • Any system is only as safe as its weakest point but always consider usability when you are securing your network, as a balance between security and functionality must be maintained.
  • Ensure only programs required by employees to perform their tasks are enabled to avoid unwanted avenues for attack.
Keep on top of patches
  • Make sure all apps and operating systems are always up to date with the latest patches available for superior cybersecurity and data protection.
  • Patches implemented for critical infrastructure should be tested fully to make sure no compromises in functionality or vulnerabilities occur within the system.
Educate system users
  1. Making sure all data users in your organisation are aware of the security in place and understand its importance is paramount.
  2. Users should be educated on their role in protecting sensitive company data, from where to store it to where they send it, and how compliancy laws affect its use.

If you want help with any of the above, why not contact our professional team for advice and support?


The Team

Meet the team of industry experts behind Comsure

Find out more

Latest News

Keep up to date with the very latest news from Comsure

Find out more


View our latest imagery from our news and work

Find out more


Think we can help you and your business? Chat to us today

Get In Touch

News Disclaimer

As well as owning and publishing Comsure's copyrighted works, Comsure wishes to use the copyright-protected works of others. To do so, Comsure is applying for exemptions in the UK copyright law. There are certain very specific situations where Comsure is permitted to do so without seeking permission from the owner. These exemptions are in the copyright sections of the Copyright, Designs and Patents Act 1988 (as amended)[]. Many situations allow for Comsure to apply for exemptions. These include 1] Non-commercial research and private study, 2] Criticism, review and reporting of current events, 3] the copying of works in any medium as long as the use is to illustrate a point. 4] no posting is for commercial purposes [payment]. (for a full list of exemptions, please read here]. Concerning the exceptions, Comsure will acknowledge the work of the source author by providing a link to the source material. Comsure claims no ownership of non-Comsure content. The non-Comsure articles posted on the Comsure website are deemed important, relevant, and newsworthy to a Comsure audience (e.g. regulated financial services and professional firms [DNFSBs]). Comsure does not wish to take any credit for the publication, and the publication can be read in full in its original form if you click the articles link that always accompanies the news item. Also, Comsure does not seek any payment for highlighting these important articles. If you want any article removed, Comsure will automatically do so on a reasonable request if you email