{"id":86935,"date":"2024-09-10T11:52:38","date_gmt":"2024-09-10T03:52:38","guid":{"rendered":"https:\/\/version-2.com\/?p=86935"},"modified":"2024-11-20T16:36:27","modified_gmt":"2024-11-20T08:36:27","slug":"why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/09\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\/","title":{"rendered":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"86935\" class=\"elementor elementor-86935\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\" width=\"1501\" height=\"939\" \/><\/p><div class=\"blog-article_rct w-richtext\"><p>Everyday, people fly the friendly internet skies, visiting different websites, and sharing files with each other. They are accessing everything from Gaming to Gambling to General Entertainment websites and sharing files that may contain personal information. Now this is <em>fine<\/em> if it\u2019s <em>personal<\/em> activity\u2014but what if you\u2019re part of a professional organization?<\/p><p>If I\u2019m part of the security team at that organization, I\u2019d want some controls to know where you\u2019re going on the internet, how you\u2019re accessing it, and who you\u2019re sharing files with in order to keep you safe from malicious attacks and data leakage.<\/p><p>Is that really necessary?<\/p><h2>Let\u2019s take a look at some trends we\u2019ve seen:<\/h2><p>Total Blocks in the last 7 days? <strong>Over 60k! <\/strong><em>Where were these users going?<\/em><\/p><h5>Almost 50% of the blocks were&#8230;you guessed it: AI\/ML<\/h5><p>Organizations are clamping down on Artificial Intelligence usage.<\/p><figure class=\"w-richtext-align-fullwidth w-richtext-figure-type-image\" style=\"max-width: 2484pxpx;\"><div><img decoding=\"async\" src=\"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2186ef17b2b94d93b7e05_66d211d2797940da85ea3322_blog-contenttypes-01.webp\" alt=\"\" \/><\/div><figcaption>An example of an organization\u2019s blocked content<\/figcaption><\/figure><h3>Top blocked categories<\/h3><ul role=\"list\"><li><strong>49.1%\u00a0AI\/ML: <\/strong>ChatGPT, Gemini, DALL-E, etc.<\/li><li><strong>8.8% File Storage: <\/strong>Dropbox, Box, WeTransfer, etc.\u00a0<strong>\u200d<\/strong><\/li><li><strong>7.8% Malicious\/Suspicious: <\/strong>Block users from being unknowingly exposed to dangerous sites<\/li><li>\u200d<strong>1.9% Software Downloads:\u00a0<\/strong>Prevent employees from downloading non-approved IT apps<\/li><\/ul><p>This data begs the question, are employees doing this intentionally?<\/p><h3>While it\u2019s hard to know for sure without asking them directly, we can deduce a few things.<\/h3><ol role=\"list\"><li><strong>AI is on the rise, and every employee is looking to automate their work, <\/strong>the data clearly shows a desire to access these tools. But they\u2019re being blocked because company policies don\u2019t want you uploading proprietary code or sensitive content.<\/li><li><strong>Categories like \u2018File Storage\u2019 are blocked to ensure employees can not access their personal cloud storage drives, <\/strong>reducing the risk of data exfiltration. The most common use case we see here is a recently terminated employee trying to take company files with them.<\/li><li><strong>Most of the time employees are completely unaware they are accessing a Malicious site<\/strong> so these blocks are protecting the accidental misstep.<\/li><\/ol><p>\u200d<\/p><p>This is why having a reliable and easy to use secure web gateway solution is so important. You need to be able to monitor activity and block access to sites that could be harmful, or non-productive to your organization.<\/p><p>Now what about those company files? I can <em>not<\/em> tell how many times leaders have said, \u201cNo I\u2019m good\u2026we have tight controls and I know we don\u2019t have any publicly exposed files.\u201d<\/p><p>\u200d<\/p><h3>Well, we challenged one of those leaders to run CASB Neural, here are <strong><em>those<\/em><\/strong> results:<\/h3><p>Out of 84M Files scanned, 2.4% are Publicly exposed. That may not sound like a lot, but it\u2019s over 2M publicly exposed files.<\/p><h5>2M Publicly exposed files!<\/h5><p>Another way of saying this is that the file is \u201cpublicly accessible.\u201d That means while you personally may have never shared this file or folder with anyone outside of your organization, it still has the <em>ability<\/em> or \u201csharing permissions\u201d that allow it to be exposed to an external party.<\/p><p>Of those 2M files, over half a million, or 25% of the found public files, fall into either Intellectual Property (IP), Personally Identifiable Information (PII), Protected Health Information (PHI) or Payment Card Industry (PCI).<\/p><ul role=\"list\"><li><strong>IP <\/strong>6.2%<strong>\u200d<\/strong><\/li><li><strong>PII<\/strong> 53.2%<\/li><li>\u200d<strong>PHI <\/strong>5.8%<\/li><li>\u200d<strong>PCI <\/strong>34.8%<\/li><\/ul><p>That means either your data, your customers, vendors, or anyones data who you work with could potentially be at risk of being exposed.<\/p><p>What are some examples of the types of files and data we found in these categories?<\/p><ol role=\"list\"><li><strong>Publicly exposed data rooms<\/strong> where anyone could download sensitive information (stock purchase agreements, equity, offer letters, etc.) about major startups<\/li><li><strong>PHI documents publicly available<\/strong> because it was the default setting when creating a sharing link<\/li><li><strong>Troves of sensitive files shared publicly<\/strong>, with no possible way to find out, including bank statements, etc.<\/li><\/ol><h2>So what does all this mean?<\/h2><p>Most of the time people are not sharing sensitive information, or going to malicious websites on purpose. So having these filters in place is crucial for catching those accidental human errors that will ultimately happen.<\/p><p>Because as the data shows, people are trying to access sites they shouldn\u2019t be, and unknowingly have file sharing permissions that could be huge security risks to your organization.<\/p><p>These solutions keep you productive and safe. So make sure you have a SWG and CASB DLP solution that is fast, reliable and invisible because at the end of the day you want it to work really well and not get in the way.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95848a6 elementor-widget elementor-widget-button\" data-id=\"95848a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/request-a-demo-or-trial\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a demo or trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be9976a elementor-widget elementor-widget-spacer\" data-id=\"be9976a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"78652\" class=\"elementor elementor-78652\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76828e1f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"76828e1f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46f06e4e\" data-id=\"46f06e4e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-101bb16 elementor-widget elementor-widget-image-box\" data-id=\"101bb16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Dope Security<\/h3><p class=\"elementor-image-box-description\">A comprehensive security solution designed to protect individuals and organizations from various cyber threats and vulnerabilities. With a focus on proactive defense and advanced technologies, Dope Security offers a range of features and services to safeguard sensitive data, systems, and networks.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Everyday, people fly the friendly internet skies, visit [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,1278,61],"tags":[1272,1285],"class_list":["post-86935","post","type-post","status-publish","format-standard","hentry","category-1273","category-dope-security","category-press-release","tag-1272","tag-dope-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dope.security\/post\/dlp-cyber-threats\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2\" \/>\n<meta property=\"og:description\" content=\"Everyday, people fly the friendly internet skies, visit [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dope.security\/post\/dlp-cyber-threats\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-10T03:52:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T08:36:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats\",\"datePublished\":\"2024-09-10T03:52:38+00:00\",\"dateModified\":\"2024-11-20T08:36:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\\\/\"},\"wordCount\":759,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6378680e707d743185107592\\\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\",\"keywords\":[\"2024\",\"Dope Security\"],\"articleSection\":[\"2024\",\"Dope Security\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats\",\"name\":\"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6378680e707d743185107592\\\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\",\"datePublished\":\"2024-09-10T03:52:38+00:00\",\"dateModified\":\"2024-11-20T08:36:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#primaryimage\",\"url\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6378680e707d743185107592\\\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\",\"contentUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6378680e707d743185107592\\\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dope.security\\\/post\\\/dlp-cyber-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dope.security\/post\/dlp-cyber-threats","og_locale":"zh_HK","og_type":"article","og_title":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2","og_description":"Everyday, people fly the friendly internet skies, visit [&hellip;]","og_url":"https:\/\/dope.security\/post\/dlp-cyber-threats","og_site_name":"Version 2","article_published_time":"2024-09-10T03:52:38+00:00","article_modified_time":"2024-11-20T08:36:27+00:00","og_image":[{"url":"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/09\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats","datePublished":"2024-09-10T03:52:38+00:00","dateModified":"2024-11-20T08:36:27+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/09\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\/"},"wordCount":759,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp","keywords":["2024","Dope Security"],"articleSection":["2024","Dope Security","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dope.security\/post\/dlp-cyber-threats#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/09\/why-swg-and-casb-solutions-are-essential-for-preventing-data-leakage-and-cyber-threats\/","url":"https:\/\/dope.security\/post\/dlp-cyber-threats","name":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#primaryimage"},"image":{"@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp","datePublished":"2024-09-10T03:52:38+00:00","dateModified":"2024-11-20T08:36:27+00:00","breadcrumb":{"@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dope.security\/post\/dlp-cyber-threats"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#primaryimage","url":"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp","contentUrl":"https:\/\/cdn.prod.website-files.com\/6378680e707d743185107592\/66d2307939fe54b6ef83aa04_blog-contenttypes-hero-02.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/dope.security\/post\/dlp-cyber-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Why SWG and CASB solutions are essential for preventing data leakage and cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-mCb","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=86935"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86935\/revisions"}],"predecessor-version":[{"id":97549,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/86935\/revisions\/97549"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=86935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=86935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=86935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}