As explained above in connection with method 300 in FIG. 3, the systems and methods disclosed herein may overcome deficiencies of other data loss prevention systems that failed to prevent the leaking of sensitive data through one or more file formats, or data object formats, that the systems could not scan or parse. For example, image files may display text and yet traditional data loss prevention systems may have failed to parse the text within the images, because the text was not encoded in a computer readable format as a string. Moreover, in some examples, performing optical character recognition to parse the text may be overly burdensome and inefficient, especially if most images do not include text, much less sensitive data. To overcome these and other problems, the disclosed systems and methods may monitor whether applications access sensitive data and then flag those applications that do access sensitive data.
FIG. 6 is a block diagram of an exemplary computing system 610 capable of implementing one or more of the embodiments described and/or illustrated herein. For example, all or a portion of computing system 610 may perform and/or be a means for performing, either alone or in combination with other elements, one or more of the steps described herein (such as one or more of the steps illustrated in FIG. 3). All or a portion of computing system 610 may also perform and/or be a means for performing any other steps, methods, or processes described and/or illustrated herein.