Did They Steal the Keys? Learn how to avoid the unpleasant scenario.

Learn how to avoid the unpleasant scenario where an employee with access to proprietary company data decides to leave the company and take that data with him or her.

October 19 2016 by

Watch this JNUC session in its entirety.

It's 2:00 p.m. on Friday afternoon and you get a phone call from HR. An employee has walked out with no notice and HR wants to know if they took any company data. How will you be able to give them that info? Today’s session described exactly how to handle this situation with Code42 CrashPlan and Jamf Pro (formerly Casper Suite).

Steve Wood, IT admin at the Integer Group and 25 years experience in IT said, “We consistently hear about outsider threats, but we almost never hear about insider threats.”

Wood went on to describe an all too common scenario where an employee with access to proprietary company data decides to leave the company and take that data with him or her. This is what Code42’s CrashPlan and Security Tools’ products – deployed properly via Jamf – can monitor and report on.

“As long as the user has an account in CrashPlan, and is logged in, you can see their data activity,” Charles Green, engineer at Code42, explained about Security Tools’ ability to monitor and log data being copied over to external media (USB drive, CD/DVD, etc) and to personal cloud services like Dropbox or iCloud.

Wood and Green dove into how to properly prepare Macs by downloading your custom CrashPlan installer, modifying the user info script to link the user to the Mac, and then packaging and deploying the installer via Jamf Pro.

With Code42 CrashPlan and Security Tools, organizations can gain visibility into blind spots and monitor insider threats by monitoring risky file movements, high risk data, cloud activity and unusual restore patterns. Combined with Jamf Pro, you can have complete control over your Macs and the data that is on them.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.