A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?
damianUY
Highly Voted 6 months, 3 weeks agoJackwasblk
5 months, 4 weeks agodurel
Most Recent 5 days, 9 hours agokaixin
1 week, 1 day agoshady23
1 week, 1 day ago9e20f4f
1 week, 2 days agospearous
1 week, 4 days agorussian
1 week, 5 days agoGeronemo
3 weeks, 1 day agodbdbfb0
3 weeks, 2 days agorussian
3 weeks, 6 days agojohnabayot
3 months, 2 weeks agomemodrums
2 months, 4 weeks agoDrCo6991
3 months, 2 weeks agoBD69
3 months, 2 weeks agobuscan422
4 months, 2 weeks agoPeshokp
4 months, 2 weeks agoganymede
4 months, 3 weeks agoganymede
3 months, 3 weeks agoBD69
3 months, 2 weeks agoPetercx
5 months, 3 weeks agoPeshokp
4 months, 2 weeks ago