{"id":3739,"date":"2016-09-02T15:01:17","date_gmt":"2016-09-02T15:01:17","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3739"},"modified":"2016-09-02T15:01:17","modified_gmt":"2016-09-02T15:01:17","slug":"data-protection-four-pronged-approach","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/","title":{"rendered":"Data Protection: A Four-Pronged Approach"},"content":{"rendered":"<p><strong>Beacon &amp; Decoy Technology: A Four-Pronged Approach to Proactive Data Protection<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-medium wp-image-3744\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521-300x263.jpg\" alt=\"Data Protection\" width=\"300\" height=\"263\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521-300x263.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521-768x674.jpg 768w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Hindsight is 20\/20, but when it comes to keeping an eye on your company\u2019s data, hindsight can be too little, too late\u2014it\u2019s much better to have 20\/20 foresight. That\u2019s the idea behind beacon and decoy technology.<\/p>\n<p><strong>\u00a0<\/strong>Beacon and decoy solutions are a preemptive strike against a breach of your company\u2019s most sensitive material.<\/p>\n<p>They employ the following four-pronged approach to place you a step ahead of malicious hackers, misguided employees, and anyone else whose activity threatens the security of your company\u2019s digital files. From this vantage point, it\u2019s easy to spot and skirt data disaster.<\/p>\n<p><strong>1. User Recognition<\/strong><\/p>\n<p><strong>\u00a0<\/strong>Think of a beacon and decoy system as a digital private eye, covertly observing your data security situation and reporting back with actionable insights.<\/p>\n<p>You\u2019ve seen the movies\u2014the best way to gather intelligence is to have an ally on the inside feeding you information. Beacons and decoys act as your informants! Once downloaded to a device, they surreptitiously monitor how end-users regularly interact with their machines. After the technology learns what normal use looks like, it can identify unusual behavior and alert you of any potential breaches.<\/p>\n<p><strong>2.\u00a0<\/strong><strong>Deception<\/strong><\/p>\n<p><strong>\u00a0<\/strong>With an understanding of the status quo, your virtual private eye employs decoys to subtly shake things up\u2014and beacons to ensure that your data isn\u2019t caught in the crossfire.<\/p>\n<p>The system marks select files (e.g., an Excel spreadsheet containing client credit card information) with beacons that function like a tracking device for your data. Disguised as hacker bait, beaconized data is distributed throughout your network, device or share points.<\/p>\n<p><strong>\u00a03.\u00a0<\/strong><strong>Alerts<\/strong><\/p>\n<p><strong>\u00a0<\/strong>If a hacker takes the bait and attempts to move or access the decoy data, your virtual private eye springs into action to protect the sensitive data and calls for backup.<\/p>\n<p>A message alerting you of the suspected data ex-filtration attempt immediately appears on the beacon and decoy system\u2019s easy-to-read dashboard. You\u2019re provided with all known forensic information, including the file\u2019s place of origin and current geo-location. Data protection in action.<\/p>\n<p><strong>\u00a04.\u00a0<\/strong><strong>Defense<\/strong><\/p>\n<p><strong>\u00a0<\/strong>This is the point at which the private investigation evolves into a sting operation. Now that you have all relevant details, you can determine the appropriate data defense strategy for data protection.<\/p>\n<p>The dashboard presents options such as screen locks and encryption. Once you\u2019ve made your selection, the beacon and decoy system automatically takes all measures to guarantee that your data remains just that.<\/p>\n<p>Your best defense is a good offense. Beacon and decoy technology\u00a0 lets you harness the power of 20\/20 foresight for proactive data protection.<\/p>\n<p>At Abrahams Consulting, we help you find and implement the best data protection solutions to secure, store, connect, and build your organization.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.abrahamsconsulting.com\/contact-us\/\">Contact us<\/a> to learn more about this discrete and sophisticated cyber security solution.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beacon &amp; Decoy Technology: A Four-Pronged Approach to Proactive Data Protection &nbsp; Hindsight is 20\/20, but when it comes to keeping an eye on your company\u2019s data, hindsight can be too little, too late\u2014it\u2019s much better to have 20\/20 foresight. That\u2019s the idea behind beacon and decoy technology. \u00a0Beacon and decoy solutions are a preemptive [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,3],"tags":[172,173],"class_list":["post-3739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-data-security","tag-beacon-technology","tag-decoy-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Protection: A Four-Pronged Approach - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Protection: A Four-Pronged Approach - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-02T15:01:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"702\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Data Protection: A Four-Pronged Approach\",\"datePublished\":\"2016-09-02T15:01:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\"},\"wordCount\":482,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\",\"keywords\":[\"beacon technology\",\"decoy technology\"],\"articleSection\":[\"CipherTrust\",\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\",\"name\":\"Data Protection: A Four-Pronged Approach - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\",\"datePublished\":\"2016-09-02T15:01:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg\",\"width\":800,\"height\":702,\"caption\":\"Data Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Protection: A Four-Pronged Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Protection: A Four-Pronged Approach - TechTonic Times","description":"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/","og_locale":"en_US","og_type":"article","og_title":"Data Protection: A Four-Pronged Approach - TechTonic Times","og_description":"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/","og_site_name":"TechTonic Times","article_published_time":"2016-09-02T15:01:17+00:00","og_image":[{"width":800,"height":702,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Data Protection: A Four-Pronged Approach","datePublished":"2016-09-02T15:01:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/"},"wordCount":482,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg","keywords":["beacon technology","decoy technology"],"articleSection":["CipherTrust","Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/","name":"Data Protection: A Four-Pronged Approach - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg","datePublished":"2016-09-02T15:01:17+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Data Protection is a stool with many legs. Beacon and Decoy Technology is a sound strategy for consideration in the on going effort to secure your data.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/08\/dreamstime_s_13228521.jpg","width":800,"height":702,"caption":"Data Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-protection-four-pronged-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Protection: A Four-Pronged Approach"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3739"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/3744"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}