Intelligent SME.tech Issue 33 | Page 19

intelligent

// INFOGRAPHIC // laptops with non-protected images and staff members sharing content with third parties outside the company ( not realising the material was confidential ).

The study covers a range of topics , including the impact of visual content leaks on various industries , common types of leaks and the costs associated with these incidents . It also shares examples of real-life content leaks and provides best practices for preventing them .
Why is this important ?
Today , keeping sensitive business content safe from unauthorised dissemination has become a top priority for companies worldwide .
Mathieu Desoubeaux , CEO of IMATAG , said : “ We hear a lot about leaks following cyberattacks , and sensitive data usually refers to data that impacts Business Continuity . However , other ‘ strategic ’ leaks are often forgotten . Visuals are not included in standard protection strategies , yet they play a pivotal role in the success of many companies .”
Companies tend to protect their data with IT and their images with legal measures . When leaks occur , one of the challenges is to find out their source . Therefore , companies need forensics tools to carry out their investigation and get evidence for legal purposes . �

VISUALS ARE NOT INCLUDED IN STANDARD PROTECTION STRATEGIES , YET THEY PLAY A PIVOTAL ROLE IN THE SUCCESS OF MANY COMPANIES .
Intelligent SME . tech
. tech
19