{"id":25539756,"date":"2022-08-27T14:59:51","date_gmt":"2022-08-27T09:29:51","guid":{"rendered":"https:\/\/entri.app\/blog\/?p=25539756"},"modified":"2022-08-27T15:01:44","modified_gmt":"2022-08-27T09:31:44","slug":"what-are-the-latest-data-loss-prevention-techniques","status":"publish","type":"post","link":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/","title":{"rendered":"What Are The Latest Data Loss Prevention Techniques?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69d41426148eb\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d41426148eb\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#What_is_Data_Loss_Prevention_DLP\" >What is Data Loss Prevention (DLP)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#Types_of_Data_Loss_Prevention_software\" >Types of Data Loss Prevention software<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#3_reasons_to_use_Data_Loss_Prevention_products\" >3 reasons to use Data Loss Prevention products<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#How_to_create_a_successful_DLP_policy_a_six-stage_guide\" >How to create a successful DLP policy: a six-stage guide<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#6_Metrics_to_Evaluate_the_Effectiveness_of_Data_Loss_Prevention_Practices\" >6 Metrics to Evaluate the Effectiveness of Data Loss Prevention Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<div>The constant turnaround of information in the age of big data and cloud computing has led to a significant increase in software vulnerability.<\/div>\n<div>\n<p>In the past couple of years, the number of data breaches and data loss incidents has increased exponentially. According to the\u00a0Bleeping Computer\u00a0report, there were over 12 thousand confirmed data breaches in 2018, a staggering 424% increase from 2017.<\/p>\n<p>Most of the breaches involved exposure of user&#8217;s personal data and disclosure of business-related documents.<\/p>\n<p>Data breaches and data loss are natural things when you have many people working with information in numerous data analytics, data mining, machine learning operations, accounting, customer support, etc. The tool that avoids this from happening is data loss prevention software.<\/p>\n<p>In this article, we will explain what is data loss prevention, and how to prevent data leakage.<\/p>\n<p><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-25520910 size-full\" src=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square.png\" alt=\"Python and Machine Learning Square\" width=\"345\" height=\"345\" srcset=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square.png 345w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-300x300.png 300w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-150x150.png 150w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-24x24.png 24w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-48x48.png 48w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-96x96.png 96w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Square-75x75.png 75w\" sizes=\"auto, (max-width: 345px) 100vw, 345px\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Data_Loss_Prevention_DLP\"><\/span><strong>What is Data Loss Prevention (DLP)?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Definition of Data Loss Prevention (aka\u00a0DLP) is a set of policies and software applications. Its goal is to monitor the information in the system and prevent the possibility of losing or breaching data for various reasons.<\/p>\n<p>&nbsp;<\/p>\n<p>There are three types of data that require special handling:<\/p>\n<ul>\n<li><strong>Intellectual Property<\/strong>\u00a0&#8211; source code, design documents, process documentation;<\/li>\n<\/ul>\n<ul>\n<li><strong>Corporate Data<\/strong>\u00a0&#8211; legal and financial documents, strategic planning documents, employee information<\/li>\n<li><strong>Customer Data<\/strong>\u00a0&#8211; personal data like name, address, phone number, location, preferences, social security numbers, credit cards, medical records, financial statements, and so on.<\/li>\n<\/ul>\n<p>Overall, the main focus of\u00a0DLP (data loss prevention) software is:<\/p>\n<ul>\n<li><strong>Keeping<\/strong>\u00a0data safe in use, in motion, and at rest<\/li>\n<\/ul>\n<ul>\n<li><strong>Monitoring<\/strong>\u00a0endpoint data movement<\/li>\n<\/ul>\n<ul>\n<li><strong>Vulnerability prevention<\/strong>, i.e., the disclosure of sensitive information (either intentionally or by accident)<\/li>\n<\/ul>\n<p>Besides,\u00a0data leakage prevention\u00a0software helps to identify the source of the insider\u2019s leak in the event of the data breach.<\/p>\n<ul>\n<li><strong>Providing<\/strong>\u00a0<strong>security measures<\/strong>\u00a0and fixing weak points in the data processing pipeline &#8211; i.e., providing encryption for sensitive data and performing routine backups.<\/li>\n<\/ul>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<h3><strong>How does Data Loss Prevention software work?<\/strong><\/h3>\n<p>A DLP solution is all about identifying sensitive data, managing its access, and taking measures in keeping it safe.<\/p>\n<p>Data leak prevention\u00a0revolves around monitoring and analysis tools:<\/p>\n<ul>\n<li>determine\u00a0whether a particular data operation is legitimate or threatening to the company\u2019s assets;<\/li>\n<li>take proper measures to keep data secure.<\/li>\n<\/ul>\n<p>Data loss protection operation revolves around two concepts:<\/p>\n<ul>\n<li>Content awareness &#8211; the information and its role in business operation;<\/li>\n<li>Contextual analysis &#8211; i.e., the medium of the content and its internal presentation coupled with the intentions of using data;<\/li>\n<\/ul>\n<p>Action-wise, data loss prevention practices revolve around the following methodologies:<\/p>\n<ol>\n<li><strong>Encryption<\/strong>\u00a0&#8211; used for basic safeguarding of sensitive data in storage and transit;<\/li>\n<li><strong>Cryptographic hashing<\/strong>\u00a0&#8211; used for anonymization of personally identifiable data;<\/li>\n<li><strong>Data fingerprinting<\/strong>\u00a0to identify and track data in the system (usually for reading, hashing, and storing activities);<\/li>\n<li><strong>Routine backups<\/strong>\u00a0of information &#8211; used to keep versions of sensitive data intact, especially in cases of unauthorized or accidental changes, movement, or erasure.<\/li>\n<\/ol>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<p>Data leak protection software&#8217;s modus operandi is broken down into four key components:<\/p>\n<ul>\n<li>Above every type of data-related operation stands\u00a0the system\u2019s policy. It defines what kind of data is sensitive and what users can do with it. Most importantly, the policy describes the course of action regarding data loss protection (for example, encrypting sensitive data or sending a notification to admin).<\/li>\n<li>The management\u00a0component is an interface for the system\u2019s policy. It is an initial set of regulations to keep things in check. It includes monitoring:\n<ul>\n<li>what data is currently used and its state of access;<\/li>\n<li>who is using which information;<\/li>\n<li>where the data is going in the process.<\/li>\n<\/ul>\n<\/li>\n<li><b>The identification<\/b>\u00a0component uses the system\u2019s policy to find sensitive data and assess its state in the system. It is also used to identify the user and his level of access.<\/li>\n<li><b>The protection<\/b>\u00a0component is the one that takes action. It is a set of DLP tools designed to safeguard sensitive information from unauthorized access and prevents its loss via the creation of backups. Usually, it is either reporting on something or providing different levels of access and encryption to the sensitive data.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_Data_Loss_Prevention_software\"><\/span><strong>Types of Data Loss Prevention software<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are three major types of Data Loss Prevention software. It is important to note that these DLP tools are used interchangeably for various purposes.<\/p>\n<p>Image source:\u00a0phoenixNAP<\/p>\n<ul>\n<li><strong>Network DLP<\/strong>\u00a0&#8211; the type of\u00a0DLP software where the solution integrates with all of the data points of the Network. This type of DLP is commonly used in corporate networks as a precautionary measure, due to the high volume of various data operations.\n<ul>\n<li>Network DLP monitors the state of data in the Network and keeps an extensive log on its movement and transformations. In a way, it is a kind of fail-safe option that avoids both routine chances of data loss and diligent malice.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Storage DLP<\/strong>\u00a0&#8211; this type of data loss prevention program is for data lakes on cloud storage. Its primary focus is on keeping the confidentiality and safety of data in the data warehouse.\n<ul>\n<li>The process includes monitoring the sensitive data in the storage and managing its access configuration accordingly. In a way, it is a kind of surveillance service with an alarm.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Endpoint DLP<\/strong>\u00a0&#8211; this type of DLP software monitors data sharing from point to point i.e., device, storage, or account. For example, you are sharing a market research report with a business analyst. This action is documented in the system&#8217;s log.\n<ul>\n<li>For example, if you share this document with somebody outside the system, it is automatically blocked, and you need to enable its access outside manually.<\/li>\n<li>In addition to sharing, endpoint DLP also keeps an eye on clipboards and even physical devices. While physical storage is not as popular now &#8211; it is still used here and there. However, physical devices can break, and this may lead to data loss.<\/li>\n<li>Endpoint DLP is similar to Network DLP. It monitors where the data goes and what happens to it, but unlike Network DLP, it is workstation-based. Thus, it handles only one source of data operations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h2><span class=\"ez-toc-section\" id=\"3_reasons_to_use_Data_Loss_Prevention_products\"><\/span><strong>3 reasons to use Data Loss Prevention products<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The vulnerability of data on cloud storage is a fact of life, and you have to deal with it. Many unfortunate things can happen to it without proper DLP security. For example:<\/p>\n<ul>\n<li><strong>Unauthorized access<\/strong>\u00a0data breach;<\/li>\n<li><strong>Data Loss<\/strong>\u00a0&#8211; i.e., irreversible change, movement or erasure of sensitive information;<\/li>\n<li><strong>Storage misconfiguration<\/strong>\u00a0&#8211; exposure of confidential data on the outside.<\/li>\n<\/ul>\n<p>With the number of data breaches\u00a0growing\u00a0exponentially with each year (by\u00a02021, total damages are estimated to be up to $6 trillion) &#8211; it is reasonable to be cautious.<\/p>\n<p>There are three main reasons why the implementation of DLP\u00a0solutions is critical for moving forward and expanding the business operation.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<h3><strong>1. Compliance<\/strong><\/h3>\n<p>Different government standards and regulations broadly cover the requirements for the safety and confidentiality of sensitive data regarding users and business processes (to name a few &#8211; GDPR, HIPAA, SOX, PCI DSS).<\/p>\n<p>In one way or another, they regulate the treatment of personally identifiable and other types of sensitive data.<\/p>\n<p>Implementation of a data loss prevention policy is one of the critical steps for compliance. In addition, the regulations map out the extent of control you have over data and give direction for more efficient data management.<\/p>\n<p>Disclosure or loss of confidential data leads to lawsuits, reputation and credibility damages, and, ultimately, loss of revenue.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h3><strong>2. Better treatment of the company\u2019s assets<\/strong><\/h3>\n<p>A company\u2019s assets what keep the engine rolling. Such valuable data requires strict monitoring of who is using and why. A data loss prevention policy covers the treatment of information such as:<\/p>\n<ul>\n<li>trade secrets;<\/li>\n<li>strategic proprietary information;<\/li>\n<li>customer lists and personally identifiable data;<\/li>\n<li>business strategies.<\/li>\n<\/ul>\n<p>The loss or breach of this data can cause a lot of problems for the company. Just ask\u00a0Facebook.<\/p>\n<p>DLP security policy clearly states types of access for sensitive data and describes courses of action, in any case.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<h3><strong>3. Data visibility<\/strong><\/h3>\n<p>The foundation of an effective data loss prevention policy is in understanding what kind of sensitive data is in the system, its location, and who is using it for what purposes.<\/p>\n<p>This process involves constant asset audits, which gives a better grasp of your data.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h2><span class=\"ez-toc-section\" id=\"How_to_create_a_successful_DLP_policy_a_six-stage_guide\"><\/span><strong>How to create a <\/strong><strong>successful DLP policy: a six-stage guide<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>1.\u00a0<strong>Identify<\/strong>\u00a0which data requires protection;<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li><strong>Evaluate<\/strong>\u00a0possible risk factors (for example, the risk of a breach through email communication or exploits in the API framework);<\/li>\n<li><strong>Assess<\/strong>\u00a0the vulnerability of different assets (for example, customer lists, legal documents, marketing analytics, and so on).<\/li>\n<li><strong>Select<\/strong>\u00a0a priority scale for the protection of different types of data &#8211; which types represent what risk to the business operation. For example:<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ul>\n<li>The app user database is an operational asset always in use, and it requires encryption both in transit and storage.<\/li>\n<li>The competitor\u2019s research data requires specified access and storage encryption.<\/li>\n<\/ul>\n<p>2. The documentation of the DLP policy should be\u00a0as thorough as possible. Everything needs to be written down to keep everybody on the same page. Being thorough provides full clarity of the proceedings and enables full compliance with standards.<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Enforce\u00a0a Data Loss Prevention policy at the organizational level.<\/li>\n<li>Keep stakeholders and users\u00a0aware\u00a0of DLP policy and its importance.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>3.\u00a0<strong>Optimize<\/strong>\u00a0data management and identify what type of data is unnecessary for business operation. If this type of data is not needed, then it should be removed, and thus, the breach or loss is impossible.<\/p>\n<p>4.\u00a0<strong>Establish<\/strong>\u00a0transparent metrics (more on that later). Things which can measure the effectiveness of a DLP security policy:<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Percentage of false positives during monitoring;<\/li>\n<li>The number of security incidents;<\/li>\n<li>Response time to an emergency.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>5.\u00a0<strong>Describe<\/strong>\u00a0the scope of access to each type of user in the system (heads of departments get more access than junior specialists).<\/p>\n<p>6.\u00a0<strong>Automate<\/strong>\u00a0the procedure with specialized software. The more workflow is automated, the easier it is to control.<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>DLP tools like McAfee DLP use machine learning anomaly detection and behavioral analytics to maintain the precision of DLP management.<\/li>\n<li>Each user group has its own set of behavioral patterns. This layout allows to quickly identify the intent of the particular data operation and neutralize suspicious activity without sustaining any damage.<br \/>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"6_Metrics_to_Evaluate_the_Effectiveness_of_Data_Loss_Prevention_Practices\"><\/span><strong>6 Metrics to Evaluate the Effectiveness of Data Loss Prevention Practices<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Data Loss Prevention is a complex operation with many moving parts. Once implemented, it needs constant optimization and enhancement in order to serve its purpose well.<\/p>\n<p>The best way of keeping\u00a0data loss prevention tools in shape is to implement tangible metrics of their effectiveness.<\/p>\n<p>Let\u2019s look at them more closely.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h3><strong>1. Data classification success rate<\/strong><\/h3>\n<p>The first step in implementing a Data Loss Prevention solution is data classification. This process identifies and differentiates types of sensitive information and describes its context. It is the backbone of every DLP tool.<\/p>\n<p>Data classification is often performed in a semi-automated mode when the basic groundwork is done by the algorithm and then validated by the operator. The percentage of erroneous classifications can show how much of the sensitive information is left behind by the monitoring tool.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<h3><strong>2. Percentage of policy exceptions<\/strong><\/h3>\n<p>A System Data Loss Prevention policy contains a list of the dos and don&#8217;ts regarding the use of data throughout the company. It also includes certain types of exceptions from the rules. It can create one-off permission for a specific employee (for example, marketing getting access to project documentation to prepare a case study) or providing wider access to a third party via API (like Facebook for vendors or advertisers).<\/p>\n<p>Monitoring the number of exceptions gives you an understanding of how much of the DLP security policy is really used. It is a good way of optimizing the weak points.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h3><strong>3. Percentage of false positives<\/strong><\/h3>\n<p>Each monitoring system gets its own share of false positives and false negatives. The root of this issue is in the Data Loss Prevention monitoring routines. Some things are less defined or unmentioned, and this causes all sorts of false alarms.<\/p>\n<p>The percentage of such events compared with the number of real alerts is a good measure for the effectiveness of the DLP tool. Helps to identify real data issues.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<h3><strong>4. Percentage of fingerprinted databases<\/strong><\/h3>\n<p>Digital fingerprinting is a method of data leakage prevention used to keep an eye on who is using what kind of data for what purpose.<\/p>\n<p>As a metric, it is a good way of understanding the integrity of information and classifying the scope of access.<\/p>\n<p>This helps in identifying tampering and tracing the possible source of a leak.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h3><strong>5. Alert response time<\/strong><\/h3>\n<p>This metric takes into consideration how much time it takes to fix an issue from its emergence to its solution.<\/p>\n<p>It helps to optimize the workflow and figure out the most effective routines of responding to alerts.<\/p>\n<div class=\"call-to-action\">\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<\/div>\n<h3><strong>6. State and amount of unmanaged devices<\/strong><\/h3>\n<p>The risk of unmanaged devices is in the lack of control over them. They create uncertainty because you can\u2019t enforce data loss protection policies.<\/p>\n<p>Such devices are data endpoints (employee workstations or smartphones), cloud storage, and removable storage &#8211; basically any departure point for information.<\/p>\n<p>The goal of this metric is to monitor the number, type, and storage size of devices outside the company\u2019s system infrastructure.<\/p>\n<p>Just like the DLP security policy exceptions, this figure must be kept at a minimum in order to avoid incidents of the breach.<\/p>\n<\/div>\n<div class=\"bialty-container\">\n<p>Data loss has a\u00a0worldwide cost of $3.92 million. Any organization lacking the diligence to protect its data is at risk of losing it to cyberattackers. Data loss is more than a mere inconvenience; it\u2019s an event that can make or break your company\u2019s future. The only meaningful way to fight such an event is with a robust\u00a0data loss prevention strategy.<\/p>\n<p>There are many\u00a0data loss prevention methods, but they have the same goal: To counter and reduce the risks of losing your company data.<\/p>\n<p>DLP technology\u00a0is available in two categories: Enterprise DLPs for desktops and servers in a company, and integrated DLPs, which are used to keep secure web gateways, email encryption, and other tools.<\/p>\n<p>Below, we discuss\u00a0data loss prevention implementation strategies. Keeping your data safe is intrinsically linked to your system\u2019s security.<\/p>\n<p>We will also look at some best practices for data loss prevention. While some require the use of software, the human link can never be discounted. Safe, robust, and effective data handling is vital.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/w75k\/zvbw\" target=\"_blank\" rel=\"noopener\">Ace your coding skills with Entri !<\/a><\/strong><\/h4>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><b>Conclusion<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A good\u00a0data loss prevention strategy\u00a0combines technology, controls, regulated access to data, and educated staff. Your company can thrive if you implement a well-structured, centralized DLP program. You have to evaluate the risks and your internal sources of data. Creating an inventory of the data you need helps maintain a streamlined operation.<\/p>\n<p><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-25522670 size-full\" src=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Rectangle-1.png\" alt=\"Python and Machine Learning Rectangle\" width=\"970\" height=\"250\" srcset=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Rectangle-1.png 970w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Rectangle-1-300x77.png 300w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Rectangle-1-768x198.png 768w, https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/04\/Python-and-Machine-Learning-Rectangle-1-750x193.png 750w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/a><\/p>\n<p>Keep your data safe with restricted access and control measures that let you see who has access and how it\u2019s used. Be wary of anomalies; use machine learning tools to keep your data safe. Take the time to educate your staff and make sure they understand the stakes in\u00a0data loss prevention controls\u00a0and the critical role they play in maintaining the company safe.<\/p>\n<h4 style=\"text-align: center\"><strong><a href=\"https:\/\/entri.sng.link\/Bcofz\/uu8c\/w409\" target=\"_blank\" rel=\"noopener\">Grab the opportunity to learn Java with Entri! Click Here<\/a><\/strong><\/h4>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The constant turnaround of information in the age of big data and cloud computing has led to a significant increase in software vulnerability. In the past couple of years, the number of data breaches and data loss incidents has increased exponentially. According to the\u00a0Bleeping Computer\u00a0report, there were over 12 thousand confirmed data breaches in 2018, [&hellip;]<\/p>\n","protected":false},"author":111,"featured_media":25539852,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[802,1864],"tags":[],"class_list":["post-25539756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-data-science-ml"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Are The Latest Data Loss Prevention Techniques? - Entri Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are The Latest Data Loss Prevention Techniques? - Entri Blog\" \/>\n<meta property=\"og:description\" content=\"The constant turnaround of information in the age of big data and cloud computing has led to a significant increase in software vulnerability. In the past couple of years, the number of data breaches and data loss incidents has increased exponentially. According to the\u00a0Bleeping Computer\u00a0report, there were over 12 thousand confirmed data breaches in 2018, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Entri Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/entri.me\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-27T09:29:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-27T09:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"615\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Feeba Mahin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@entri_app\" \/>\n<meta name=\"twitter:site\" content=\"@entri_app\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Feeba Mahin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\"},\"author\":{\"name\":\"Feeba Mahin\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/person\/f036dab84abae3dcc9390a1110d95d36\"},\"headline\":\"What Are The Latest Data Loss Prevention Techniques?\",\"datePublished\":\"2022-08-27T09:29:51+00:00\",\"dateModified\":\"2022-08-27T09:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\"},\"wordCount\":2647,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/entri.app\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png\",\"articleSection\":[\"Articles\",\"Data Science and Machine Learning\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\",\"url\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\",\"name\":\"What Are The Latest Data Loss Prevention Techniques? - Entri Blog\",\"isPartOf\":{\"@id\":\"https:\/\/entri.app\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png\",\"datePublished\":\"2022-08-27T09:29:51+00:00\",\"dateModified\":\"2022-08-27T09:31:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage\",\"url\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png\",\"contentUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png\",\"width\":820,\"height\":615,\"caption\":\"What Are The Latest Data Loss Prevention Techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/entri.app\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Entri Skilling\",\"item\":\"https:\/\/entri.app\/blog\/category\/entri-skilling\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Science and Machine Learning\",\"item\":\"https:\/\/entri.app\/blog\/category\/entri-skilling\/data-science-ml\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What Are The Latest Data Loss Prevention Techniques?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/entri.app\/blog\/#website\",\"url\":\"https:\/\/entri.app\/blog\/\",\"name\":\"Entri Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/entri.app\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/entri.app\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/entri.app\/blog\/#organization\",\"name\":\"Entri App\",\"url\":\"https:\/\/entri.app\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png\",\"contentUrl\":\"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png\",\"width\":989,\"height\":446,\"caption\":\"Entri App\"},\"image\":{\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/entri.me\/\",\"https:\/\/x.com\/entri_app\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/entri.app\/blog\/#\/schema\/person\/f036dab84abae3dcc9390a1110d95d36\",\"name\":\"Feeba Mahin\",\"url\":\"https:\/\/entri.app\/blog\/author\/feeba123\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are The Latest Data Loss Prevention Techniques? - Entri Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/","og_locale":"en_US","og_type":"article","og_title":"What Are The Latest Data Loss Prevention Techniques? - Entri Blog","og_description":"The constant turnaround of information in the age of big data and cloud computing has led to a significant increase in software vulnerability. In the past couple of years, the number of data breaches and data loss incidents has increased exponentially. According to the\u00a0Bleeping Computer\u00a0report, there were over 12 thousand confirmed data breaches in 2018, [&hellip;]","og_url":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/","og_site_name":"Entri Blog","article_publisher":"https:\/\/www.facebook.com\/entri.me\/","article_published_time":"2022-08-27T09:29:51+00:00","article_modified_time":"2022-08-27T09:31:44+00:00","og_image":[{"width":820,"height":615,"url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png","type":"image\/png"}],"author":"Feeba Mahin","twitter_card":"summary_large_image","twitter_creator":"@entri_app","twitter_site":"@entri_app","twitter_misc":{"Written by":"Feeba Mahin","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#article","isPartOf":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/"},"author":{"name":"Feeba Mahin","@id":"https:\/\/entri.app\/blog\/#\/schema\/person\/f036dab84abae3dcc9390a1110d95d36"},"headline":"What Are The Latest Data Loss Prevention Techniques?","datePublished":"2022-08-27T09:29:51+00:00","dateModified":"2022-08-27T09:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/"},"wordCount":2647,"commentCount":0,"publisher":{"@id":"https:\/\/entri.app\/blog\/#organization"},"image":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png","articleSection":["Articles","Data Science and Machine Learning"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/","url":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/","name":"What Are The Latest Data Loss Prevention Techniques? - Entri Blog","isPartOf":{"@id":"https:\/\/entri.app\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage"},"image":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png","datePublished":"2022-08-27T09:29:51+00:00","dateModified":"2022-08-27T09:31:44+00:00","breadcrumb":{"@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#primaryimage","url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png","contentUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2022\/08\/What-Are-The-Latest-Data-Loss-Prevention-Techniques.png","width":820,"height":615,"caption":"What Are The Latest Data Loss Prevention Techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/entri.app\/blog\/what-are-the-latest-data-loss-prevention-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/entri.app\/blog\/"},{"@type":"ListItem","position":2,"name":"Entri Skilling","item":"https:\/\/entri.app\/blog\/category\/entri-skilling\/"},{"@type":"ListItem","position":3,"name":"Data Science and Machine Learning","item":"https:\/\/entri.app\/blog\/category\/entri-skilling\/data-science-ml\/"},{"@type":"ListItem","position":4,"name":"What Are The Latest Data Loss Prevention Techniques?"}]},{"@type":"WebSite","@id":"https:\/\/entri.app\/blog\/#website","url":"https:\/\/entri.app\/blog\/","name":"Entri Blog","description":"","publisher":{"@id":"https:\/\/entri.app\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/entri.app\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/entri.app\/blog\/#organization","name":"Entri App","url":"https:\/\/entri.app\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png","contentUrl":"https:\/\/entri.app\/blog\/wp-content\/uploads\/2019\/10\/Entri-Logo-1.png","width":989,"height":446,"caption":"Entri App"},"image":{"@id":"https:\/\/entri.app\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/entri.me\/","https:\/\/x.com\/entri_app"]},{"@type":"Person","@id":"https:\/\/entri.app\/blog\/#\/schema\/person\/f036dab84abae3dcc9390a1110d95d36","name":"Feeba Mahin","url":"https:\/\/entri.app\/blog\/author\/feeba123\/"}]}},"_links":{"self":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25539756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/comments?post=25539756"}],"version-history":[{"count":6,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25539756\/revisions"}],"predecessor-version":[{"id":25539861,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/posts\/25539756\/revisions\/25539861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/media\/25539852"}],"wp:attachment":[{"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/media?parent=25539756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/categories?post=25539756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entri.app\/blog\/wp-json\/wp\/v2\/tags?post=25539756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}