{"id":12771,"date":"2025-09-26T09:33:23","date_gmt":"2025-09-26T16:33:23","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=12771"},"modified":"2025-10-13T16:36:30","modified_gmt":"2025-10-13T16:36:30","slug":"data-loss-prevention","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/","title":{"rendered":"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy"},"content":{"rendered":"\n<p>At Salesforce, trust is our number one value, and protecting your data is our top priority. The digital landscape, however, is constantly changing. Building a strong <a href=\"https:\/\/www.salesforce.com\/platform\/data-backup-recovery\/what-is-data-loss-prevention-dlp\/\" target=\"_blank\" rel=\"noreferrer noopener\">data loss prevention<\/a> (DLP) strategy starts with understanding <a href=\"https:\/\/www.salesforce.com\/platform\/cloud-data-security\/enterprise-cloud-security-guide\" target=\"_blank\" rel=\"noreferrer noopener\">shared responsibility<\/a>. There are security measures Salesforce provides for you, and actions you need take  yourself based on your business needs.<\/p>\n\n\n\n<p>Shared responsibility is represented in our <a href=\"https:\/\/www.youtube.com\/watch?v=sfP6GxZ-CAQ\" target=\"_blank\" rel=\"noreferrer noopener\">security architecture<\/a> as well. We have the invisibles (our responsibility), as well as the configurables and enhanceables (your responsibility). The <a href=\"https:\/\/youtu.be\/eF44MPpU270?si=xQDvutQzRpVMgn-v\" target=\"_blank\" rel=\"noreferrer noopener\">invisibles<\/a> are things like our secure infrastructure and providing reliable access to your data and systems. The <a href=\"https:\/\/youtu.be\/a9H9mDpze68?si=RCm82mhKKs_WCJ1I\" target=\"_blank\" rel=\"noreferrer noopener\">configurables<\/a> are built-in security controls like <a href=\"https:\/\/www.salesforce.com\/platform\/single-sign-on-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">single sign-on (SSO)<\/a> and <a href=\"https:\/\/security.salesforce.com\/mfa\" target=\"_blank\" rel=\"noreferrer noopener\">authentication<\/a>, and are where your part in building a strong DLP strategy starts. So, it&#8217;s important to ensure these are set up correctly for your business and to review them regularly as your business&#8217;s Salesforce environment changes.<\/p>\n\n\n\n<p>Finally, there\u2019s the <a href=\"https:\/\/youtu.be\/r2RxHFv5rwk?si=CF4YlcIjX8nZfYzI\" target=\"_blank\" rel=\"noreferrer noopener\">enhanceables.<\/a> These are the advanced security and privacy products that we offer to help you manage your responsibilities related to data security, resilience, and compliance. Think of our add-on capabilities as helping you more effectively use locks, alarms, and cameras to secure what&#8217;s valuable (in this case, your data). Let\u2019s have a closer look at these enhanceables and how they can help you up-level your data loss prevention strategy.<\/p>\n\n\n\n<div class=\"layout-one wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Your Salesforce data deserves a stronger defense.<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Now\u2019s the time to build a proactive, Salesforce-specific DLP strategy that strengthens security posture without hampering innovation.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/data-loss-prevention-guide\/\">Get the guide<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"wp-block-offer__graphics wp-block-offer__contour\"><\/div>\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-one.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-one.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-one.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-strengthen-your-security-posture-with-stronger-locks\">Strengthen your security posture with stronger locks\u00a0<\/h2>\n\n\n\n<p>Let\u2019s start with \u201clocks\u201d. The first step in any DLP strategy is to fortify your defenses. This means ensuring your foundational security settings are correctly configured to prevent unauthorized access from the start.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Know your data:<\/strong> You can&#8217;t protect what you don&#8217;t know you have. The cornerstone of a strong posture is <strong>data classification<\/strong>. By identifying and labeling sensitive data like Personally Identifiable Information (PII) or confidential information, you can prioritize your security efforts. Products like <strong><a href=\"https:\/\/www.salesforce.com\/platform\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Center<\/a><\/strong> help you quickly classify thousands of fields, so you know exactly where your most valuable data lives.<\/li>\n\n\n\n<li><strong>Secure your sandboxes: <a href=\"https:\/\/www.salesforce.com\/platform\/sandboxes-environments\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sandboxes<\/a><\/strong> are essential for development and testing, but they often contain copies of production data. This exposes real PII to a broader audience, including third-party developers. With <strong><a href=\"https:\/\/www.salesforce.com\/platform\/data-masking\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Mask &amp; Seed<\/a><\/strong>, you can easily anonymize or delete sensitive data in your sandboxes, closing a commonly overlooked security gap.<\/li>\n\n\n\n<li><strong>Enforce least privilege:<\/strong> Powerful permissions like &#8220;Modify All Data&#8221; should be assigned with caution. Using <strong><a href=\"https:\/\/www.salesforce.com\/platform\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Center<\/a>,<\/strong> you can easily review who has access to sensitive data and identify overly permissive profiles and permission sets that require remediation.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-flag-new-risks-with-smarter-alarms\">Flag new risks with smarter alarms\u00a0<\/h2>\n\n\n\n<p>Once your locks are in place, you need an alarm system to notify you of suspicious activity. A proactive alerting strategy allows you to detect and respond to threats before they can cause significant damage.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automate your watchdog:<\/strong> You can&#8217;t monitor everything manually. Set up real-time alerts for high-risk events. For example, you can create a policy to immediately notify your security team whenever a <strong>new connected app is installed<\/strong> or a user is assigned a powerful permission set.<\/li>\n\n\n\n<li><strong>Block threats automatically:<\/strong> Go beyond simple alerts by actively blocking unwanted behavior. <strong>Transaction Security Policies<\/strong> act like an alarm that automatically locks the door. For example, you can configure policies to:\n<ul class=\"wp-block-list\">\n<li><strong>Block large data exports<\/strong>, preventing a user from running a report with 100,000 customer records and exporting it.<\/li>\n\n\n\n<li><strong>Prevent risky permission assignments<\/strong>, stopping an admin from granting &#8220;Modify All Data&#8221; access.<\/li>\n\n\n\n<li><strong>Block API calls from unknown IP ranges<\/strong>, a key defense against credential theft.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-investigate-exposure-with-clear-cameras\">Investigate exposure with clear cameras\u00a0<\/h2>\n\n\n\n<p>If a security incident does occur, you need the ability to see exactly what happened. This visibility is critical for understanding the scope of the incident, remediating the damage, and preventing it from happening again.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Get the full story:<\/strong> <a href=\"https:\/\/www.salesforce.com\/platform\/shield\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Shield<\/strong> <strong>Event Monitoring<\/strong><\/a> provides detailed, forensic-level logs of everything happening in your org. If a user&#8217;s credentials are compromised, you can trace the bad actor&#8217;s every step: What time they logged in, what IP address they used, which records they accessed, and what reports they ran.<\/li>\n\n\n\n<li><strong>Rewind the clock:<\/strong> In a worst-case scenario where data is deleted or corrupted, having a clear &#8220;video&#8221; of the event isn&#8217;t enough. With <strong><a href=\"https:\/\/www.salesforce.com\/platform\/data-backup-recovery\/\" target=\"_blank\" rel=\"noreferrer noopener\">Backup &amp; Recover<\/a><\/strong>, you can compare the state of your data before and after the incident and restore the affected records to their original state with just a few clicks.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-take-the-next-step\"><strong>Take the next step<\/strong><\/h2>\n\n\n\n<p>Building a DLP strategy is an ongoing journey, not a one-time project. By focusing on strengthening your locks, setting up smart alarms, and ensuring you have clear cameras, you can effectively manage your side of the shared responsibility model.<\/p>\n\n\n\n<div class=\"layout-five wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">How strong is your data loss prevention strategy?<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Learn best practices and actionable steps to improve visibility and detect risk.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/form\/platform\/data-loss-prevention-webinar\/\">Watch the webinar<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t\t\t<\/div>\n\t<\/div>\n\n\t\n\t\t\t<!-- Standard Illustration -->\n\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__illustration\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-illustration-layout-five.png\" alt=\"\">\n\n\t\t<!-- Small Accent Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__accent\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-accent-layout-five.png\" alt=\"\">\n\t\t\n\t\t<!-- Left Side Illustration -->\n\t\t\n\t\t<!-- Cloud Illustration -->\n\t\t\t\t\t<img decoding=\"async\" class=\"wp-block-offer__graphics wp-block-offer__cloud\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/themes\/salesforce-blog\/dist\/images\/offer-block\/offer-cloud-layout-five.png\" alt=\"\">\n\t\t\n\t<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Take control of your side of the shared responsibility model by using this simple strategy to protect your organization&#8217;s most valuable data.<\/p>\n","protected":false},"author":675,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"68ed2a72ba6ec2c56e2bde83","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[],"sf_content_type":[],"coauthors":[532],"class_list":["post-12771","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Build a Salesforce Data Loss Prevention (DLP) Strategy<\/title>\n<meta name=\"description\" content=\"Secure your Salesforce org with a 3-step data loss prevention (DLP) strategy to fortify defenses, detect threats, and investigate incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy\" \/>\n<meta property=\"og:description\" content=\"Take control of your side of the shared responsibility model by using this simple strategy to protect your organization&#039;s most valuable data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-26T16:33:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T16:36:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/11\/salesforce.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\"}],\"headline\":\"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy\",\"datePublished\":\"2025-09-26T16:33:23+00:00\",\"dateModified\":\"2025-10-13T16:36:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\"},\"wordCount\":779,\"commentCount\":0,\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\",\"name\":\"How to Build a Salesforce Data Loss Prevention (DLP) Strategy\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\"},\"datePublished\":\"2025-09-26T16:33:23+00:00\",\"dateModified\":\"2025-10-13T16:36:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\"},\"description\":\"Secure your Salesforce org with a 3-step data loss prevention (DLP) strategy to fortify defenses, detect threats, and investigate incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g6040395424e4d2530c0dde101c8ae736\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g\"},\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/author\/mike-melonesalesforce-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Build a Salesforce Data Loss Prevention (DLP) Strategy","description":"Secure your Salesforce org with a 3-step data loss prevention (DLP) strategy to fortify defenses, detect threats, and investigate incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/","og_locale":"en_GB","og_type":"article","og_title":"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy","og_description":"Take control of your side of the shared responsibility model by using this simple strategy to protect your organization's most valuable data.","og_url":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/","og_site_name":"Salesforce","article_published_time":"2025-09-26T16:33:23+00:00","article_modified_time":"2025-10-13T16:36:30+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/11\/salesforce.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0"}],"headline":"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy","datePublished":"2025-09-26T16:33:23+00:00","dateModified":"2025-10-13T16:36:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/"},"wordCount":779,"commentCount":0,"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/","url":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/","name":"How to Build a Salesforce Data Loss Prevention (DLP) Strategy","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website"},"datePublished":"2025-09-26T16:33:23+00:00","dateModified":"2025-10-13T16:36:30+00:00","author":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0"},"description":"Secure your Salesforce org with a 3-step data loss prevention (DLP) strategy to fortify defenses, detect threats, and investigate incidents.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/eu\/blog\/data-loss-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Locks, Alarms, and Cameras: A 3-Step Framework for a Stronger Data Loss Prevention Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website","url":"https:\/\/www.salesforce.com\/eu\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/8d70abd8e12f83dd60ca082ba5e897f0","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g6040395424e4d2530c0dde101c8ae736","url":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dc321869b8a0ee3e2fd6c052767bb667efc1a42c06f2b20f591d67cac9041ebd?s=96&d=mm&r=g"},"url":"https:\/\/www.salesforce.com\/eu\/blog\/author\/mike-melonesalesforce-com\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/eu\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/comments?post=12771"}],"version-history":[{"count":1,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12771\/revisions"}],"predecessor-version":[{"id":12849,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/12771\/revisions\/12849"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media?parent=12771"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_topic?post=12771"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_content_type?post=12771"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/coauthors?post=12771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}