Introducing User Data Governance
Coro User Data Governance defines a structured approach to secure data handling for an organization’s end users, including employees, contractors, and third-party vendors. It mitigates risks such as data breaches, leaks, and unauthorized data access when users interact with cloud applications and email. Compliance requires defining and implementing policies, procedures, and controls aligned with applicable laws, regulations, and industry standards.
Coro User Data Governance supports compliance with regulatory requirements. The following are examples of regulations Coro can help enforce:
- GDPR
- GLB
- HIPAA
- SOC2
- SOX
Coro User Data Governance monitors for:
- Credit card data
- Health data
- Non-public data
- Personal data
Additionally, admin users can configure monitoring for the following business-sensitive data:
- Certificates
- Data objects with specific keywords
- Passwords
- Source code
- Specific file types
Threat types
Coro User Data Governance provides the means to reduce the risk of data breaches and to protect sensitive information from unauthorized access and misuse. A number of threats can place an organization's data at risk and it is important to be aware of them and take measures to limit their effect:
- Cyber attacks : Cybercriminals can use a variety of methods to access sensitive information, such as hacking into systems, phishing scams, and malware.
- Human error : Mistakes, such as accidentally sending sensitive information to the wrong person, can result in data breaches.
- Insider threat : Employees and contractors can intentionally or unintentionally access or misuse sensitive information.
- Physical theft : Sensitive information can be stolen or lost through physical theft or misplacement of laptop and smartphone devices.
Sign in to the Coro console with your admin credentials to configure, review, and analyze the data protection activities that are being captured for both protected and unprotected users in your organization.
To learn more about the privacy and security regulations with which Coro can help, see Compliance with Coro.