Introducing User Data Governance
Coro's User Data Governance module monitors and protects against data loss, misuse, and accidental exposure by an organization’s end users, including employees, contractors, and third-party vendors. It mitigates risks such as data breaches, leaks, and unauthorized data access when users interact with cloud applications and email.
User Data Governance promotes regulatory compliance through the definition and implementation of policies, procedures, and controls aligned with applicable laws, regulations, and industry standards. The following are examples of regulations Coro can help enforce:
- GDPR
- GLB
- HIPAA
- SOC2
- SOX
To learn more about the privacy and security regulations with which Coro can help, see Compliance with Coro.
What data does Coro monitor and protect
Coro's User Data Governance module monitors user activity for exposure of:
- Credit card data
- Health data
- Non-public data
- Personal data
Additionally, admin users can enable monitoring and protection for the following business-sensitive data:
- Certificates
- Data objects with specific keywords
- Passwords
- Source code
- Specific file types
To learn more about sensitive data types in Coro's User Data Governance module, see Regulatory sensitive information.
Threat types and prevention options
Various threats can place an organization's data at risk, such as:
- Cyber attacks : Cybercriminals can use a variety of methods to access sensitive information, such as hacking into systems, phishing scams, and malware.
- Human error : Mistakes, such as accidentally sending sensitive information to the wrong person, can result in data breaches.
- Insider threat : Employees and contractors can intentionally or unintentionally access or misuse sensitive information.
- Physical theft : Sensitive information can be stolen or lost through physical theft or misplacement of laptop and smartphone devices.
Coro recommends promoting awareness of these risks across your organization and taking measures to limit their effect. To meet these challenges, Coro's User Data Governance module enables admin users to configure policies to protect sensitive information from data breaches, unauthorized access, and misuse.
By configuring an outbound gateway proxy for your email service, Coro can monitor for and actively block, breaches as part of a data loss prevention strategy.
To learn more about configuring User Data Governance, see Configuring data governance settings.