Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
To detect unauthorized disclosure of confidential documents sent over corporate email, monitoring all emails based on pre-defined criteria is the best approach. This involves setting up automated monitoring systems that analyze email content, attachments, and metadata to identify any potential unauthorized disclosures. By defining specific criteria (such as keywords related to confidential information), organizations can proactively detect and prevent leaks. Requiring encryption before sending documents (option A) is important but does not address monitoring for unauthorized disclosures. Firewalls (option B) protect the network but do not specifically focus on email content.Reporting outgoing emails marked as confidential (option C) relies on user self-reporting and may not catch all incidents12.Reference:1(https://www.isaca.org/resources/isaca-journal/past-issues/2010/data-governance-for-privacy-confidentiality-and-compliance-a-holistic-approach)2(https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2020/volume-6/best-practices-for-privacy-audits)
Limited Time Offer
25%
Off
Weldon
7 months agoNelida
6 months agoGertude
6 months agoKimi
6 months agoPortia
6 months agoDerrick
7 months agoRex
7 months agoReena
7 months agoErin
7 months agoBerry
8 months agoNu
6 months agoAide
7 months agoDino
7 months agoReuben
8 months agoFreeman
8 months agoKiley
7 months agoClorinda
7 months agoMargery
7 months agoJerry
7 months agoReuben
8 months agoSherron
8 months agoZena
8 months agoCora
8 months agoKanisha
8 months ago