A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?
damianUY
Highly Voted 1 year, 8 months agoJackwasblk
1 year, 7 months agoJasonMunoz
Most Recent 11 months, 3 weeks agoshady23
1 year, 1 month agodurel
1 year, 1 month agokaixin
1 year, 1 month agoshady23
1 year, 1 month ago9e20f4f
1 year, 1 month agospearous
1 year, 1 month agorussian
1 year, 1 month agoGeronemo
1 year, 2 months agodbdbfb0
1 year, 2 months agorussian
1 year, 2 months agojohnabayot
1 year, 4 months agomemodrums
1 year, 4 months agoDrCo6991
1 year, 5 months agoBD69
1 year, 5 months agobuscan422
1 year, 5 months agoPeshokp
1 year, 6 months ago