Skip to main content

How should I prevent users from mistakenly contributing to a data breach in my institution?

tiCrypt allows you to manipulate the data in particular ways based on the Zero-Trust principle.

You can trust your users, but you can also verify their trust.

To verify a users's statement, navigate to the tab in the Miscellaneuous section in the Audit Logs.

  • Ask your users about the time when they said they acted as the system.
  • In the Timestamp column, view the specified dates of all actions.
  • Copy-and-paste the corresponding rows into an email.
  • Send the email to the audit team to verify the event.
  • Collect all action data for that period and conclude about your user's trust.
tip

You can personalize ways to audit the trust of your institution and choose how to enforce it per individual.