WikiLeaks leaks serve as an important wake-up call to improve policies, procedures and safeguards. Every government organization or enterprise must have policies in place to define who gets access to what information, and when. Host-based security solutions include tools that allow an organization to protect and control laptops and desktop computers. Traffic Profiling tools can look across the network at individual users in aggregate and see what type of sites are being visited, such as Dropbox, Mozy or YouSendIt. Data Loss Prevention (DLP) tools can help determine the source of the leak.”]
Source: https://www.csoonline.com/article/2126944/5-ways-to-make-sure-you-aren-t-the-next-wikileak.html