News & Insights by Atakama

How Atakama’s Browser Security Platform Helps Protect Against Data Leakage

Written by Atakama Team | Sep 10, 2024 1:00:00 PM

Data loss prevention, aka data leakage, has been around since the dawn of modern computing. In 1961, MIT computer science professor Fernando Corbató introduced the first digital password as a solution to time-sharing on the sole computer being shared by multiple users. Not surprisingly, this resulted in the first password compromise, when a user sought to gain more computing time by guessing a colleague’s password.

Data leakage encompasses an extensive range of activities and can originate from several sources, including human error, hardware compromise, and, of course, malicious cyberattacks.

Data leakage causes range from user error to natural disasters to malware.

With most applications today being accessed in the browser, it’s the browser that malicious actors target when attempting to exfiltrate data. With cyberattacks targeting vulnerabilities in web applications, in-browser data leakage protection has become essential. Unfortunately, most cybersecurity professionals have not prioritized browser security. Luckily, however, there’s an easy solution, the Atakama Managed Browser Security Platform. Purpose built for MSPs, the platform provides data leakage prevention to help secure any organization. Let's breakdown some of the solutions to combat data leakage.

Upload and download blocking

Real-time visibility of downloads and uploads by end-user identifies dangerous websites.

What does it do? In addition to producing comprehensive reports of every download and upload by user and application, the MSP can customize functionality to allow users to upload and download from specific applications only. These access rules prevent users from providing and receiving data from specific sites. For example, users can be prohibited from uploading company information to their personal Dropbox and downloading documents from non-company sanctioned applications.

How does it help with data leakage protection?  The platform allows the MSP to block sites that are potential risks. For example, employees who go to their personal Google Drive and upload documents daily could be exfiltrating company information. The MSP would then be able to put rules in place to prevent this activity from happening. 

The platform’s visibility helps the MSP identify and block known malicious sites or non-company-sanctioned applications, which can help with employee productivity and prevent malware from being downloaded.

Data Masking

With data masking you can help protect PII from exfiltration.

What does it do? As the name suggest, on-screen data masking is a solution that covers up PII in real time in the browser. It hides information like social security and credit card numbers from being wholesale displayed on screen. The platform also generates a report of user activity with masked data.

How does it help with data leakage protection? Anytime PII information is available on a website, the feature can hide it and require the user to affirmatively reveal the information. Masking allows teams to work without worrying about anyone stealing sensitive information on their screens. It also helps protect data in public spaces when users are working in places like coffee shops and airports. Reducing the risk of exfiltration by hiding PII is paramount in today’s remote work reality.

Watermarking

Web pages that contain sensitive information can be watermarked with the user email and the date.

What does it do? This on-screen solution adds a watermark to specific applications as selected by the MSP. The watermark consists of the user's name as it exists in Entra, and includes a timestamp of when the user visits the site. As with all other Atakama features, user access to watermarked pages is logged and included as a report in Atakama’s MSP Management Console.

How does it help with data leakage protection? By including the user’s name on the screen, the feature sends a psychological message – “this application is important, so be aware”. Most users won’t be inclined to take a screenshot when their name and timestamp are plastered on the screen. Watermarking also helps prevent spoofed website attacks. For example, business email compromise attacks. Users should enter their credentials and send wires only from bank sites that contain the watermark. If there is no watermark, the site is likely fake.

Native Browser Settings Control

What does it do? The platform provides browser settings control that allow the MSP to auto delete cookies, clear cache, and browsing history, while restricting Incognito/InPrivate and guest modes.

How does it help with data leakage protection? Deleting cookies reduces the risk of unauthorized access to stored data by clearing potentially sensitive information that could be exploited. Clearing the cache also removes stored data and ensures that outdated versions of websites are not accessible. Deleting browser history protects the company if the device falls into the wrong hands. And restricting Incognito/InPrivate and guest modes means that all browser activities are being tracked.

Data leakage protection, browser security, and more

These savvy solutions delivered seamlessly to the end user by the Atakama Managed Browser Security Platform won't fix every leak you have, but it can significantly reduce the risk. User error, hardware failure, and software glitches will happen, but with the platform, the MSP can help prevent downloading malware, exfiltration of sensitive data, and avoid fake websites.

Despite its importance, browser security has been underserved, exposing organizations to new threats. But tools like the Atakama Managed Browser Security Platform can further enhance data leakage protection efforts to help organizations safeguard sensitive information.

The Atakama Managed Browser Security Platform is a browser extension that transforms the browser into a secure and managed workspace. It empowers MSPs to control security, set data policies, gain insights, and optimize user experiences.

Schedule your demo today and find out how to improve visibility, eliminate shadow apps, and give your customers an innovative productivity tool that won't impact existing workflows or require additional employee training.